Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2022-34169
Vulnerability from cvelistv5
Published
2022-07-19 00:00
Modified
2024-08-03 08:16
Severity ?
EPSS score ?
Summary
The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Apache Software Foundation | Apache Xalan-J |
Version: Xalan-J < |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T08:16:17.277Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://lists.apache.org/thread/2qvl7r43wb4t8p9dd9om1bnkssk07sn8" }, { "tags": [ "x_transferred" ], "url": "https://lists.apache.org/thread/12pxy4phsry6c34x2ol4fft6xlho4kyw" }, { "name": "[oss-security] 20220719 CVE-2022-34169: Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/07/19/5" }, { "tags": [ "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "name": "[oss-security] 20220719 Re: CVE-2022-34169: Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/07/19/6" }, { "name": "[oss-security] 20220719 Re: CVE-2022-34169: Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/07/20/2" }, { "name": "[oss-security] 20220720 Re: CVE-2022-34169: Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/07/20/3" }, { "name": "DSA-5188", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2022/dsa-5188" }, { "name": "DSA-5192", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2022/dsa-5192" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20220729-0009/" }, { "name": "FEDORA-2022-19b6f21746", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO/" }, { "name": "FEDORA-2022-ae563934f7", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2/" }, { "name": "FEDORA-2022-e573851f56", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB/" }, { "name": "FEDORA-2022-d26586b419", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM/" }, { "name": "FEDORA-2022-80afe2304a", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ/" }, { "name": "FEDORA-2022-b76ab52e73", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L/" }, { "tags": [ "x_transferred" ], "url": "http://packetstormsecurity.com/files/168186/Xalan-J-XSLTC-Integer-Truncation.html" }, { "name": "[oss-security] 20221017 Re: CVE-2022-34169: Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/10/18/2" }, { "name": "[debian-lts-announce] 20221018 [SECURITY] [DLA 3155-1] bcel security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00024.html" }, { "name": "DSA-5256", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2022/dsa-5256" }, { "name": "[oss-security] 20221104 Re: CVE-2022-42920: Apache Commons BCEL prior to 6.6.0 allows producing arbitrary bytecode via out-of-bounds writing", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/04/8" }, { "name": "[oss-security] 20221107 Re: CVE-2022-42920: Apache Commons BCEL prior to 6.6.0 allows producing arbitrary bytecode via out-of-bounds writing", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/07/2" }, { "tags": [ "x_transferred" ], "url": "https://security.gentoo.org/glsa/202401-25" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20240621-0006/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Apache Xalan-J", "vendor": "Apache Software Foundation", "versions": [ { "lessThanOrEqual": "2.7.2", "status": "affected", "version": "Xalan-J", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Reported by Felix Wilhelm, Google Project Zero" } ], "descriptions": [ { "lang": "en", "value": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan." } ], "problemTypes": [ { "descriptions": [ { "description": "integer truncation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-05T07:29:25.615Z", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "url": "https://lists.apache.org/thread/2qvl7r43wb4t8p9dd9om1bnkssk07sn8" }, { "url": "https://lists.apache.org/thread/12pxy4phsry6c34x2ol4fft6xlho4kyw" }, { "name": "[oss-security] 20220719 CVE-2022-34169: Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2022/07/19/5" }, { "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "name": "[oss-security] 20220719 Re: CVE-2022-34169: Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2022/07/19/6" }, { "name": "[oss-security] 20220719 Re: CVE-2022-34169: Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2022/07/20/2" }, { "name": "[oss-security] 20220720 Re: CVE-2022-34169: Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2022/07/20/3" }, { "name": "DSA-5188", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2022/dsa-5188" }, { "name": "DSA-5192", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2022/dsa-5192" }, { "url": "https://security.netapp.com/advisory/ntap-20220729-0009/" }, { "name": "FEDORA-2022-19b6f21746", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO/" }, { "name": "FEDORA-2022-ae563934f7", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2/" }, { "name": "FEDORA-2022-e573851f56", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB/" }, { "name": "FEDORA-2022-d26586b419", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM/" }, { "name": "FEDORA-2022-80afe2304a", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ/" }, { "name": "FEDORA-2022-b76ab52e73", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L/" }, { "url": "http://packetstormsecurity.com/files/168186/Xalan-J-XSLTC-Integer-Truncation.html" }, { "name": "[oss-security] 20221017 Re: CVE-2022-34169: Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2022/10/18/2" }, { "name": "[debian-lts-announce] 20221018 [SECURITY] [DLA 3155-1] bcel security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00024.html" }, { "name": "DSA-5256", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2022/dsa-5256" }, { "name": "[oss-security] 20221104 Re: CVE-2022-42920: Apache Commons BCEL prior to 6.6.0 allows producing arbitrary bytecode via out-of-bounds writing", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/04/8" }, { "name": "[oss-security] 20221107 Re: CVE-2022-42920: Apache Commons BCEL prior to 6.6.0 allows producing arbitrary bytecode via out-of-bounds writing", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/07/2" }, { "url": "https://security.gentoo.org/glsa/202401-25" }, { "url": "https://security.netapp.com/advisory/ntap-20240621-0006/" } ], "source": { "discovery": "UNKNOWN" }, "title": "Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets", "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2022-34169", "datePublished": "2022-07-19T00:00:00", "dateReserved": "2022-06-21T00:00:00", "dateUpdated": "2024-08-03T08:16:17.277Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2022-34169\",\"sourceIdentifier\":\"security@apache.org\",\"published\":\"2022-07-19T18:15:11.740\",\"lastModified\":\"2024-11-21T07:08:59.400\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.\"},{\"lang\":\"es\",\"value\":\"La biblioteca Apache Xalan Java XSLT es vulnerable a un problema de truncamiento de enteros cuando procesa hojas de estilo XSLT maliciosas. Esto puede usarse para corromper los archivos de clase Java generados por el compilador interno XSLTC y ejecutar c\u00f3digo de bytes Java arbitrario. El proyecto Apache Xalan Java est\u00e1 inactivo y en proceso de ser retirado. No son esperadas futuras versiones de Apache Xalan Java que abordan este problema. Nota: Los tiempos de ejecuci\u00f3n de Java (como OpenJDK) incluyen copias reempaquetadas de Xalan.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-681\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:xalan-java:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.7.2\",\"matchCriteriaId\":\"E406791B-F9FD-4E3F-831C-296D8F8FF9BE\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA6FEEC2-9F11-4643-8827-749718254FED\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:graalvm:20.3.6:*:*:*:enterprise:*:*:*\",\"matchCriteriaId\":\"7D961E24-EA18-4217-B5F5-F847726D84E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:graalvm:21.3.2:*:*:*:enterprise:*:*:*\",\"matchCriteriaId\":\"601D92C4-F71F-47E2-9041-5C286D2137F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:graalvm:22.1.0:*:*:*:enterprise:*:*:*\",\"matchCriteriaId\":\"B18FE85D-C53D-44E9-8992-715820D1264B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.7.0:update343:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E3C0BA3-FCD3-4CB8-B8C7-F931090A7DBE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.8.0:update333:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB2A5440-7FA7-4A86-AA19-E2ABBD809B19\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:11.0.15.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C0485FC-E4B2-464E-8228-1387AC5F353B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:17.0.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AF3539B-0434-4310-AE88-F46864C7C20F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:18.0.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5CC9398-71B6-4480-95ED-EDCE838D157E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.7.0:update343:*:*:*:*:*:*\",\"matchCriteriaId\":\"60614E43-090E-44D7-94AD-FFAE38FF111F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.8.0:update333:*:*:*:*:*:*\",\"matchCriteriaId\":\"131E1C9E-721C-4176-B78B-69C01F90A9A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:11.0.15.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD4BFA12-588A-4D8D-B45F-648A55EC674C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:17.0.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DF70EEA-EC9D-4FFC-B7BE-76F50C34D999\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:18.0.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4EF9CFB1-CEC9-483E-BECF-618190C03944\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11\",\"versionEndIncluding\":\"11.0.15\",\"matchCriteriaId\":\"DD2ADA66-DCD0-4D28-80B2-77A0265CE7B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13\",\"versionEndIncluding\":\"13.0.11\",\"matchCriteriaId\":\"8CA6BC07-2BDA-4913-AF2B-FD2146B0E539\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"15\",\"versionEndIncluding\":\"15.0.7\",\"matchCriteriaId\":\"5A2E366B-549D-48C5-B3FB-AD0E8C75AE08\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"17\",\"versionEndIncluding\":\"17.0.3\",\"matchCriteriaId\":\"15FD6A0B-BB1A-4875-926C-AB1B6EC1A053\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"E78B7C5A-FA51-41E4-AAB0-C6DED2EFCF4C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*\",\"matchCriteriaId\":\"02011EDC-20A7-4A16-A592-7C76E0037997\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC6D4652-1226-4C60-BEDF-01EBF8AC0849\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C1F9ED7-7D93-41F4-9130-15BA734420AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CF9CDF1-95D3-4125-A73F-396D2280FC4E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*\",\"matchCriteriaId\":\"A13266DC-F8D9-4F30-987F-65BBEAF8D3A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*\",\"matchCriteriaId\":\"C28388AB-CFC9-4749-A90F-383F5B905EA9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA1B00F9-A81C-48B7-8DAA-F394DDF323F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA7AD457-6CE6-4925-8D94-A907B40233D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6F3FDD1-7CAC-4B84-ABB7-64E9D3FBD708\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*\",\"matchCriteriaId\":\"5480E5AD-DB46-474A-9B57-84ED088A75FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*\",\"matchCriteriaId\":\"881A4AE9-6012-4E91-98BE-0A352CC20703\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E1E1079-57D9-473B-A017-964F4745F329\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8D6446E-2915-4F12-87BE-E7420BC2626E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*\",\"matchCriteriaId\":\"564EDCE3-16E6-401D-8A43-032D1F8875E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*\",\"matchCriteriaId\":\"08278802-D31B-488A-BA6A-EBC816DF883A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*\",\"matchCriteriaId\":\"72BDA05A-C8BD-472E-8465-EE1F3E5D8CF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BBB0969-565E-43E2-B067-A10AAA5F1958\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*\",\"matchCriteriaId\":\"D78BE95D-6270-469A-8035-FCDDB398F952\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*\",\"matchCriteriaId\":\"88C24F40-3150-4584-93D9-8307DE04EEE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0FC5A03-FF11-4787-BBF1-3ACF93A21F2D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*\",\"matchCriteriaId\":\"19626B36-62FC-4497-A2E1-7D6CD9839B19\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*\",\"matchCriteriaId\":\"5713AEBD-35F6-44E8-A0CC-A42830D7AE20\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BE0C04B-440E-4B35-ACC8-6264514F764C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*\",\"matchCriteriaId\":\"555EC2A6-0475-48ED-AE0C-B306714A9333\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC1CF2AD-3F7A-4EF3-BD41-117A21553A9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update261:*:*:*:*:*:*\",\"matchCriteriaId\":\"02C55E2E-AEDE-455C-B128-168C918B5D97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update271:*:*:*:*:*:*\",\"matchCriteriaId\":\"81831D37-6597-441B-87DE-38F7191BEA42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update281:*:*:*:*:*:*\",\"matchCriteriaId\":\"EEA1594D-0AB5-436D-9E60-C26EE2175753\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update291:*:*:*:*:*:*\",\"matchCriteriaId\":\"B868FA41-C71B-491C-880B-484740B30C72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*\",\"matchCriteriaId\":\"C242D3BE-9114-4A9E-BB78-45754C7CC450\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update301:*:*:*:*:*:*\",\"matchCriteriaId\":\"95954182-9541-4181-9647-B17FA5A79F9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update311:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F6F0137-F91F-4028-BED2-C29640D52C23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update321:*:*:*:*:*:*\",\"matchCriteriaId\":\"EAFB6B15-4AE6-47FC-8847-9DFADB7AE253\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*\",\"matchCriteriaId\":\"D61068FE-18EE-4ADB-BC69-A3ECE8724575\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFB59E80-4EC4-4399-BF40-6733E4E475A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*\",\"matchCriteriaId\":\"84E31265-22E1-4E91-BFCB-D2AFF445926A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB3A58C3-94BB-4120-BE1D-AAF8BBF7F22B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*\",\"matchCriteriaId\":\"50319E52-8739-47C5-B61E-3CA9B6A9A48F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*\",\"matchCriteriaId\":\"7ED515B9-DC74-4DC5-B98A-08D87D85E11E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D1D4868-1F9F-43F7-968C-6469B67D3F1B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*\",\"matchCriteriaId\":\"568F1AC4-B0D7-4438-82E5-0E61500F2240\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5E99B4A-EDAD-4471-81C4-7E9C775C9D9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*\",\"matchCriteriaId\":\"14E9133E-9FF3-40DB-9A11-7469EF5FD265\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*\",\"matchCriteriaId\":\"94834710-3FA9-49D9-8600-B514CBCA4270\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*\",\"matchCriteriaId\":\"4228D9E1-7D82-4B49-9669-9CDAD7187432\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6231F48-2936-4F7D-96D5-4BA11F78EBE8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*\",\"matchCriteriaId\":\"D96D5061-4A81-497E-9AD6-A8381B3B454C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*\",\"matchCriteriaId\":\"5345C21E-A01B-43B9-9A20-F2783D921C60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*\",\"matchCriteriaId\":\"B219F360-83BD-4111-AB59-C9D4F55AF4C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*\",\"matchCriteriaId\":\"D25377EA-8E8F-4C76-8EA9-3BBDFB352815\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*\",\"matchCriteriaId\":\"59FEFE05-269A-4EAF-A80F-E4C2107B1197\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7E2AA7C-F602-4DB7-9EC1-0708C46C253C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB70E154-A304-429E-80F5-8D87B00E32D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"70892D06-6E75-4425-BBF0-4B684EC62A1C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:milestone1:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A165D71-71CC-4E6A-AA4F-FF8DB5B9A5AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:milestone2:*:*:*:*:*:*\",\"matchCriteriaId\":\"7417B2BB-9AC2-4AF4-A828-C89A0735AD92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:milestone3:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A0A57B5-6F88-4288-9CDE-F6613FE068D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:milestone4:*:*:*:*:*:*\",\"matchCriteriaId\":\"67ED8559-C348-4932-B7CE-CB96976A30EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:milestone5:*:*:*:*:*:*\",\"matchCriteriaId\":\"40AC3D91-263F-4345-9FAA-0E573EA64590\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:milestone6:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD92AFA9-81F8-48D4-B79A-E7F066F69A99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:milestone7:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C4B2F24-A730-4818-90C8-A2D90C081F03\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:milestone8:*:*:*:*:*:*\",\"matchCriteriaId\":\"464087F2-C285-4574-957E-CE0663F07DE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:milestone9:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E9BB880-A4F6-4887-8BB9-47AA298753D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*\",\"matchCriteriaId\":\"18DCFF53-B298-4534-AB5C-8A5EF59C616F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*\",\"matchCriteriaId\":\"083419F8-FDDF-4E36-88F8-857DB317C1D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7A74F65-57E8-4C9A-BA96-5EF401504F13\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D0B90FC-57B6-4315-9B29-3C36E58B2CF5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*\",\"matchCriteriaId\":\"07812576-3C35-404C-A7D7-9BE9E3D76E00\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*\",\"matchCriteriaId\":\"00C52B1C-5447-4282-9667-9EBE0720B423\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*\",\"matchCriteriaId\":\"92BB9EB0-0C12-4E77-89EE-FB77097841B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF9D5DCE-2E8F-42B9-9038-AEA7E8C8CFFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABC0E7BB-F8B7-4369-9910-71240E4073A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*\",\"matchCriteriaId\":\"551B2640-8CEC-4C24-AF8B-7A7CEF864D9D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*\",\"matchCriteriaId\":\"0AE30779-48FB-451E-8CE1-F469F93B8772\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*\",\"matchCriteriaId\":\"60590FDE-7156-4314-A012-AA38BD2ADDC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE51AD3A-8331-4E8F-9DB1-7A0051731DFB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*\",\"matchCriteriaId\":\"F24F6122-2256-41B6-9033-794C6424ED99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EAFA79E-8C7A-48CF-8868-11378FE4B26F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1D6F19F-59B5-4BB6-AD35-013384025970\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7BA97BC-3ADA-465A-835B-6C3C5F416B56\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*\",\"matchCriteriaId\":\"B71F77A4-B7EB-47A1-AAFD-431A7D040B86\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*\",\"matchCriteriaId\":\"91D6BEA9-5943-44A4-946D-CEAA9BA99376\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*\",\"matchCriteriaId\":\"C079A3E0-44EB-4B9C-B4FC-B7621D165C3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CB74086-14B8-4237-8357-E0C6B5BB8313\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*\",\"matchCriteriaId\":\"3ABED20A-7C34-4E86-9AFB-F4DC9ECBB3A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*\",\"matchCriteriaId\":\"00C2B9C9-1177-4DA6-96CE-55F37F383F99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update222:*:*:*:*:*:*\",\"matchCriteriaId\":\"435CF189-0BD8-40DF-A0DC-99862CDEAF8A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*\",\"matchCriteriaId\":\"12A3F367-33AD-47C3-BFDC-871A17E72C94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update232:*:*:*:*:*:*\",\"matchCriteriaId\":\"A18F994F-72CA-4AF5-A7D1-9F5AEA286D85\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*\",\"matchCriteriaId\":\"78261932-7373-4F16-91E0-1A72ADBEBC3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update242:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BD90D3D-9B3A-4101-9A8A-5090F0A9719F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*\",\"matchCriteriaId\":\"B38C0276-0EBD-4E0B-BFCF-4DDECACE04E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update252:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5A40B8A-D428-4008-9F21-AF21394C51D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update262:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEC5B777-01E1-45EE-AF95-C3BD1F098B2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update271:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B504718-5DCE-43B4-B19A-C6B6E7444BD3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update281:*:*:*:*:*:*\",\"matchCriteriaId\":\"3102AA10-99A8-49A9-867E-7EEC56865680\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update282:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A55CBC7-A7B2-4B89-8AB5-ED30DBE6814E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update291:*:*:*:*:*:*\",\"matchCriteriaId\":\"15BA8A26-2CDA-442B-A549-6BE92DCCD205\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update301:*:*:*:*:*:*\",\"matchCriteriaId\":\"56F2883B-6A1B-4081-8877-07AF3A73F6CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update302:*:*:*:*:*:*\",\"matchCriteriaId\":\"98C0742E-ACDD-4DB4-8A4C-B96702C8976C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8483034-DD5A-445D-892F-CDE90A7D58EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update312:*:*:*:*:*:*\",\"matchCriteriaId\":\"1716A5CD-1C32-4F19-9DDE-F9C7CCB6B420\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update322:*:*:*:*:*:*\",\"matchCriteriaId\":\"DAB4F663-BCAF-43DB-BCC3-24C060B0CBAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update332:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8EF5BB8-7DAF-49B0-A11E-14E89EF7377A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*\",\"matchCriteriaId\":\"8279718F-878F-4868-8859-1728D13CD0D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C024E1A-FD2C-42E8-B227-C2AFD3040436\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F24389D-DDD0-4204-AA24-31C920A4F47E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*\",\"matchCriteriaId\":\"966979BE-1F21-4729-B6B8-610F74648344\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8534265-33BF-460D-BF74-5F55FDE50F29\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*\",\"matchCriteriaId\":\"F77AFC25-1466-4E56-9D5F-6988F3288E16\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*\",\"matchCriteriaId\":\"A650BEB8-E56F-4E42-9361-8D2DB083F0F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*\",\"matchCriteriaId\":\"799FFECD-E80A-44B3-953D-CDB5E195F3AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7047507-7CAF-4A14-AA9A-5CEF806EDE98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFC7B179-95D3-4F94-84F6-73F1034A1AF2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FB28526-9385-44CA-AF08-1899E6C3AE4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*\",\"matchCriteriaId\":\"E26B69E4-0B43-415F-A82B-52FDCB262B3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*\",\"matchCriteriaId\":\"27BC4150-70EC-462B-8FC5-20B3442CBB31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*\",\"matchCriteriaId\":\"02646989-ECD9-40AE-A83E-EFF4080C69B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:openjdk:18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56CBFC1F-C120-44F2-877A-C1C880AA89C4\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80E516C0-98A4-4ADE-B69F-66A772E2BAAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EF6650C-558D-45C8-AE7D-136EE70CB6D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*\",\"matchCriteriaId\":\"3A756737-1CC4-42C2-A4DF-E1C893B4E2D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*\",\"matchCriteriaId\":\"B55E8D50-99B4-47EC-86F9-699B67D473CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:cloud_insights_acquisition_unit:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CCAA4004-9319-478C-9D55-0E8307F872F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0F202E8-97E6-4BBB-A0B6-4CA3F5803C08\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3C19813-E823-456A-B1CE-EC0684CE1953\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1BE6C1F-2565-4E97-92AA-16563E5660A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6E9EF0C-AFA8-4F7B-9FDC-1E0F7C26E737\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD7447BC-F315-4298-A822-549942FC118B\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:azul:zulu:6.47:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E4633C4-E552-439D-8FE4-139E3A7956CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:azul:zulu:7.54:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50C77346-8893-44F0-B0D1-5D4D30A9CA3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:azul:zulu:8.62:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63E58DE0-A96A-452E-986F-3BD2FEA7C723\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:azul:zulu:11.56:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3FB1BF4-3FCF-4007-A9E3-97C35483D6A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:azul:zulu:13.48:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD7A33EC-DE03-424F-9796-E5EA071FF6CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:azul:zulu:15.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CCDAFFA9-0AA4-4C70-9154-8DA4BB255FD2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:azul:zulu:17.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6302149-28AA-481E-BC6C-87D05E73768A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:azul:zulu:18.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20DFD9D8-8648-40F7-81B8-04F852A337FA\"}]}]}],\"references\":[{\"url\":\"http://packetstormsecurity.com/files/168186/Xalan-J-XSLTC-Integer-Truncation.html\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/07/19/5\",\"source\":\"security@apache.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/07/19/6\",\"source\":\"security@apache.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/07/20/2\",\"source\":\"security@apache.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/07/20/3\",\"source\":\"security@apache.org\",\"tags\":[\"Mailing List\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/10/18/2\",\"source\":\"security@apache.org\",\"tags\":[\"Mailing List\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/11/04/8\",\"source\":\"security@apache.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/11/07/2\",\"source\":\"security@apache.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.apache.org/thread/12pxy4phsry6c34x2ol4fft6xlho4kyw\",\"source\":\"security@apache.org\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Vendor Advisory\"]},{\"url\":\"https://lists.apache.org/thread/2qvl7r43wb4t8p9dd9om1bnkssk07sn8\",\"source\":\"security@apache.org\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Vendor Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2022/10/msg00024.html\",\"source\":\"security@apache.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L/\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM/\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2/\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO/\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ/\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB/\",\"source\":\"security@apache.org\"},{\"url\":\"https://security.gentoo.org/glsa/202401-25\",\"source\":\"security@apache.org\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20220729-0009/\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20240621-0006/\",\"source\":\"security@apache.org\"},{\"url\":\"https://www.debian.org/security/2022/dsa-5188\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2022/dsa-5192\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2022/dsa-5256\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpujul2022.html\",\"source\":\"security@apache.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://packetstormsecurity.com/files/168186/Xalan-J-XSLTC-Integer-Truncation.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/07/19/5\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/07/19/6\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/07/20/2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/07/20/3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/10/18/2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/11/04/8\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/11/07/2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.apache.org/thread/12pxy4phsry6c34x2ol4fft6xlho4kyw\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Vendor Advisory\"]},{\"url\":\"https://lists.apache.org/thread/2qvl7r43wb4t8p9dd9om1bnkssk07sn8\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Vendor Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2022/10/msg00024.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.gentoo.org/glsa/202401-25\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20220729-0009/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20240621-0006/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.debian.org/security/2022/dsa-5188\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2022/dsa-5192\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2022/dsa-5256\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpujul2022.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]}]}}" } }
rhsa-2022_5685
Vulnerability from csaf_redhat
Published
2022-07-21 14:12
Modified
2024-11-26 03:08
Summary
Red Hat Security Advisory: java-11-openjdk security update
Notes
Topic
An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.
Security Fix(es):
* OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) (CVE-2022-34169)
* OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540)
* OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.\n\nSecurity Fix(es):\n\n* OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) (CVE-2022-34169)\n\n* OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540)\n\n* OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:5685", "url": "https://access.redhat.com/errata/RHSA-2022:5685" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5685.json" } ], "title": "Red Hat Security Advisory: java-11-openjdk security update", "tracking": { "current_release_date": "2024-11-26T03:08:27+00:00", "generator": { "date": "2024-11-26T03:08:27+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2022:5685", "initial_release_date": "2022-07-21T14:12:37+00:00", "revision_history": [ { "date": "2022-07-21T14:12:37+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-07-21T14:12:37+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-26T03:08:27+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product": { "name": "Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_e4s:8.1::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_1.src", "product": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_1.src", "product_id": "java-11-openjdk-1:11.0.16.0.8-1.el8_1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.16.0.8-1.el8_1?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_1.ppc64le", "product": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_1.ppc64le", "product_id": "java-11-openjdk-1:11.0.16.0.8-1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.16.0.8-1.el8_1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_1.ppc64le", "product": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_1.ppc64le", "product_id": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo@11.0.16.0.8-1.el8_1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_1.ppc64le", "product": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_1.ppc64le", "product_id": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel@11.0.16.0.8-1.el8_1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_1.ppc64le", "product": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_1.ppc64le", "product_id": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless@11.0.16.0.8-1.el8_1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_1.ppc64le", "product": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_1.ppc64le", "product_id": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc@11.0.16.0.8-1.el8_1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_1.ppc64le", "product": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_1.ppc64le", "product_id": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc-zip@11.0.16.0.8-1.el8_1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_1.ppc64le", "product": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_1.ppc64le", "product_id": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods@11.0.16.0.8-1.el8_1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_1.ppc64le", "product": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_1.ppc64le", "product_id": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src@11.0.16.0.8-1.el8_1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_1.ppc64le", "product": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_1.ppc64le", "product_id": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debugsource@11.0.16.0.8-1.el8_1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "product": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "product_id": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debuginfo@11.0.16.0.8-1.el8_1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "product": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "product_id": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-debuginfo@11.0.16.0.8-1.el8_1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "product": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "product_id": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-slowdebug-debuginfo@11.0.16.0.8-1.el8_1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "product": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "product_id": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-debuginfo@11.0.16.0.8-1.el8_1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "product": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "product_id": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-slowdebug-debuginfo@11.0.16.0.8-1.el8_1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "product": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "product_id": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-slowdebug-debuginfo@11.0.16.0.8-1.el8_1?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_1.x86_64", "product": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_1.x86_64", "product_id": "java-11-openjdk-1:11.0.16.0.8-1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.16.0.8-1.el8_1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_1.x86_64", "product": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_1.x86_64", "product_id": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo@11.0.16.0.8-1.el8_1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_1.x86_64", "product": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_1.x86_64", "product_id": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel@11.0.16.0.8-1.el8_1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_1.x86_64", "product": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_1.x86_64", "product_id": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless@11.0.16.0.8-1.el8_1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_1.x86_64", "product": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_1.x86_64", "product_id": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc@11.0.16.0.8-1.el8_1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_1.x86_64", "product": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_1.x86_64", "product_id": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc-zip@11.0.16.0.8-1.el8_1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_1.x86_64", "product": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_1.x86_64", "product_id": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods@11.0.16.0.8-1.el8_1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_1.x86_64", "product": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_1.x86_64", "product_id": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src@11.0.16.0.8-1.el8_1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_1.x86_64", "product": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_1.x86_64", "product_id": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debugsource@11.0.16.0.8-1.el8_1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "product": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "product_id": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debuginfo@11.0.16.0.8-1.el8_1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "product": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "product_id": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-debuginfo@11.0.16.0.8-1.el8_1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "product": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "product_id": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-slowdebug-debuginfo@11.0.16.0.8-1.el8_1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "product": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "product_id": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-debuginfo@11.0.16.0.8-1.el8_1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "product": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "product_id": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-slowdebug-debuginfo@11.0.16.0.8-1.el8_1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "product": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "product_id": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-slowdebug-debuginfo@11.0.16.0.8-1.el8_1?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-11-openjdk-1:11.0.16.0.8-1.el8_1.ppc64le" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el8_1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_1.src as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-11-openjdk-1:11.0.16.0.8-1.el8_1.src" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el8_1.src", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-11-openjdk-1:11.0.16.0.8-1.el8_1.x86_64" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_1.ppc64le" }, "product_reference": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_1.x86_64" }, "product_reference": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_1.ppc64le" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_1.x86_64" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_1.ppc64le" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_1.x86_64" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le" }, "product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64" }, "product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le" }, "product_reference": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64" }, "product_reference": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_1.ppc64le" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_1.x86_64" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le" }, "product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64" }, "product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le" }, "product_reference": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64" }, "product_reference": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_1.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_1.x86_64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_1.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_1.x86_64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_1.ppc64le" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_1.x86_64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le" }, "product_reference": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64" }, "product_reference": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-11-openjdk-src-1:11.0.16.0.8-1.el8_1.ppc64le" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-11-openjdk-src-1:11.0.16.0.8-1.el8_1.x86_64" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21540", "cwe": { "id": "CWE-402", "name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108540" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: class compilation issue (Hotspot, 8281859)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.E4S:java-11-openjdk-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-1:11.0.16.0.8-1.el8_1.src", "AppStream-8.1.0.Z.E4S:java-11-openjdk-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-src-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-src-1:11.0.16.0.8-1.el8_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21540" }, { "category": "external", "summary": "RHBZ#2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21540", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21540" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-21T14:12:37+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.1.0.Z.E4S:java-11-openjdk-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-1:11.0.16.0.8-1.el8_1.src", "AppStream-8.1.0.Z.E4S:java-11-openjdk-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-src-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-src-1:11.0.16.0.8-1.el8_1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5685" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.E4S:java-11-openjdk-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-1:11.0.16.0.8-1.el8_1.src", "AppStream-8.1.0.Z.E4S:java-11-openjdk-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-src-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-src-1:11.0.16.0.8-1.el8_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: class compilation issue (Hotspot, 8281859)" }, { "cve": "CVE-2022-21541", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108543" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.E4S:java-11-openjdk-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-1:11.0.16.0.8-1.el8_1.src", "AppStream-8.1.0.Z.E4S:java-11-openjdk-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-src-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-src-1:11.0.16.0.8-1.el8_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21541" }, { "category": "external", "summary": "RHBZ#2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21541", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21541" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-21T14:12:37+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.1.0.Z.E4S:java-11-openjdk-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-1:11.0.16.0.8-1.el8_1.src", "AppStream-8.1.0.Z.E4S:java-11-openjdk-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-src-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-src-1:11.0.16.0.8-1.el8_1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5685" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.E4S:java-11-openjdk-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-1:11.0.16.0.8-1.el8_1.src", "AppStream-8.1.0.Z.E4S:java-11-openjdk-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-src-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-src-1:11.0.16.0.8-1.el8_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)" }, { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108554" } ], "notes": [ { "category": "description", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.E4S:java-11-openjdk-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-1:11.0.16.0.8-1.el8_1.src", "AppStream-8.1.0.Z.E4S:java-11-openjdk-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-src-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-src-1:11.0.16.0.8-1.el8_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "RHBZ#2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-34169", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-21T14:12:37+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.1.0.Z.E4S:java-11-openjdk-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-1:11.0.16.0.8-1.el8_1.src", "AppStream-8.1.0.Z.E4S:java-11-openjdk-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-src-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-src-1:11.0.16.0.8-1.el8_1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5685" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.E4S:java-11-openjdk-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-1:11.0.16.0.8-1.el8_1.src", "AppStream-8.1.0.Z.E4S:java-11-openjdk-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-11-openjdk-src-1:11.0.16.0.8-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-11-openjdk-src-1:11.0.16.0.8-1.el8_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)" } ] }
rhsa-2022_5726
Vulnerability from csaf_redhat
Published
2022-07-26 18:26
Modified
2024-11-26 03:08
Summary
Red Hat Security Advisory: java-17-openjdk security, bug fix, and enhancement update
Notes
Topic
An update for java-17-openjdk is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit.
The following packages have been upgraded to a later upstream version: java-17-openjdk (17.0.4.0.8). (BZ#2084650)
Security Fix(es):
* OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) (CVE-2022-34169)
* OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540)
* OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541)
* OpenJDK: random exponentials issue (Libraries, 8283875) (CVE-2022-21549)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Previous Red Hat builds of OpenJDK 17 altered the arguments passed to sun.security.pkcs11.wrapper.PKCS11.getInstance() in order to facilitate FIPS support. This build adds an additional form of the method, retaining the original arguments, so that applications which depend on this internal method continue to function with Red Hat builds of OpenJDK. (BZ#2099913)
* With previous Red Hat builds of OpenJDK 17, Mac key generation and import would fail due to the lack of the CKA_SIGN attribute on the key. This attribute is now added as part of the NSS FIPS configuration. (BZ#2108190)
* With the release of Red Hat Enterprise Linux 8.6, a change was made so that disabling OpenJDK FIPS mode required the use of both the -Djava.security.disableSystemPropertiesFile=true and -Dcom.redhat.fips=false options, with the intention that FIPS mode could be controlled independently of system security properties. This change has now been reverted and only -Djava.security.disableSystemPropertiesFile=true is required to disable FIPS mode, as in Red Hat Enterprise Linux 8.4. (BZ#2108206)
* Previous Red Hat builds of OpenJDK 17 running in FIPS mode with a SecurityManager would fail due to a lack of module access permissions. This has now been corrected. (BZ#2108209)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for java-17-openjdk is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit.\n\nThe following packages have been upgraded to a later upstream version: java-17-openjdk (17.0.4.0.8). (BZ#2084650)\n\nSecurity Fix(es):\n\n* OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) (CVE-2022-34169)\n\n* OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540)\n\n* OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541)\n\n* OpenJDK: random exponentials issue (Libraries, 8283875) (CVE-2022-21549)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Previous Red Hat builds of OpenJDK 17 altered the arguments passed to sun.security.pkcs11.wrapper.PKCS11.getInstance() in order to facilitate FIPS support. This build adds an additional form of the method, retaining the original arguments, so that applications which depend on this internal method continue to function with Red Hat builds of OpenJDK. (BZ#2099913)\n\n* With previous Red Hat builds of OpenJDK 17, Mac key generation and import would fail due to the lack of the CKA_SIGN attribute on the key. This attribute is now added as part of the NSS FIPS configuration. (BZ#2108190)\n\n* With the release of Red Hat Enterprise Linux 8.6, a change was made so that disabling OpenJDK FIPS mode required the use of both the -Djava.security.disableSystemPropertiesFile=true and -Dcom.redhat.fips=false options, with the intention that FIPS mode could be controlled independently of system security properties. This change has now been reverted and only -Djava.security.disableSystemPropertiesFile=true is required to disable FIPS mode, as in Red Hat Enterprise Linux 8.4. (BZ#2108206)\n\n* Previous Red Hat builds of OpenJDK 17 running in FIPS mode with a SecurityManager would fail due to a lack of module access permissions. This has now been corrected. (BZ#2108209)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:5726", "url": "https://access.redhat.com/errata/RHSA-2022:5726" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2084650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084650" }, { "category": "external", "summary": "2099913", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099913" }, { "category": "external", "summary": "2108190", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108190" }, { "category": "external", "summary": "2108206", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108206" }, { "category": "external", "summary": "2108209", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108209" }, { "category": "external", "summary": "2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "2108547", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108547" }, { "category": "external", "summary": "2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "2109106", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2109106" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5726.json" } ], "title": "Red Hat Security Advisory: java-17-openjdk security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-11-26T03:08:58+00:00", "generator": { "date": "2024-11-26T03:08:58+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2022:5726", "initial_release_date": "2022-07-26T18:26:45+00:00", "revision_history": [ { "date": "2022-07-26T18:26:45+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-07-26T18:26:45+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-26T03:08:58+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux CRB (v. 8)", "product": { "name": "Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::crb" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "product": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "product_id": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk@17.0.4.0.8-2.el8_6?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-demo@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-javadoc@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-javadoc-zip@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-jmods@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-src@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-static-libs@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-debugsource@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-debuginfo@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-debuginfo@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-debuginfo@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-demo-fastdebug@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-demo-slowdebug@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-fastdebug@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-slowdebug@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-fastdebug@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-fastdebug@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-slowdebug@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-jmods-fastdebug@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-jmods-slowdebug@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-slowdebug@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-src-fastdebug@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-src-slowdebug@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-static-libs-fastdebug@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-static-libs-slowdebug@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-fastdebug-debuginfo@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-slowdebug-debuginfo@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-fastdebug-debuginfo@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-fastdebug-debuginfo@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-slowdebug-debuginfo@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product": { "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product_id": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-slowdebug-debuginfo@17.0.4.0.8-2.el8_6?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-demo@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-javadoc@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-javadoc-zip@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-jmods@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-src@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-static-libs@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-debugsource@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-debuginfo@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-debuginfo@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-debuginfo@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-demo-fastdebug@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-demo-slowdebug@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-fastdebug@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-slowdebug@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-fastdebug@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-fastdebug@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-slowdebug@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-jmods-fastdebug@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-jmods-slowdebug@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-slowdebug@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-src-fastdebug@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-src-slowdebug@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-static-libs-fastdebug@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-static-libs-slowdebug@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-fastdebug-debuginfo@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-slowdebug-debuginfo@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-fastdebug-debuginfo@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-fastdebug-debuginfo@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-slowdebug-debuginfo@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product": { "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product_id": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-slowdebug-debuginfo@17.0.4.0.8-2.el8_6?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-demo@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-javadoc@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-javadoc-zip@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-jmods@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-src@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-static-libs@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-debugsource@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-debuginfo@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-debuginfo@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-debuginfo@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-demo-fastdebug@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-demo-slowdebug@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-fastdebug@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-slowdebug@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-fastdebug@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-fastdebug@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-slowdebug@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-jmods-fastdebug@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-jmods-slowdebug@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-slowdebug@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-src-fastdebug@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-src-slowdebug@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-static-libs-fastdebug@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-static-libs-slowdebug@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-fastdebug-debuginfo@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-slowdebug-debuginfo@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-fastdebug-debuginfo@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-fastdebug-debuginfo@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-slowdebug-debuginfo@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product": { "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product_id": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-slowdebug-debuginfo@17.0.4.0.8-2.el8_6?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "product": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "product_id": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk@17.0.4.0.8-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "product": { "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "product_id": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-demo@17.0.4.0.8-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "product": { "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "product_id": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel@17.0.4.0.8-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "product": { "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "product_id": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless@17.0.4.0.8-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "product": { "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "product_id": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-javadoc@17.0.4.0.8-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "product": { "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "product_id": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-javadoc-zip@17.0.4.0.8-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "product": { "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "product_id": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-jmods@17.0.4.0.8-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "product": { "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "product_id": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-src@17.0.4.0.8-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "product": { "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "product_id": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-static-libs@17.0.4.0.8-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "product": { "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "product_id": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-debugsource@17.0.4.0.8-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "product": { "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "product_id": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-debuginfo@17.0.4.0.8-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "product": { "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "product_id": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-debuginfo@17.0.4.0.8-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "product": { "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "product_id": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-debuginfo@17.0.4.0.8-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "product": { "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "product_id": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-demo-slowdebug@17.0.4.0.8-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "product": { "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "product_id": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-slowdebug@17.0.4.0.8-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "product": { "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "product_id": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-slowdebug@17.0.4.0.8-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "product": { "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "product_id": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-jmods-slowdebug@17.0.4.0.8-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "product": { "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "product_id": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-slowdebug@17.0.4.0.8-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "product": { "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "product_id": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-src-slowdebug@17.0.4.0.8-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "product": { "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "product_id": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-static-libs-slowdebug@17.0.4.0.8-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "product": { "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "product_id": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-slowdebug-debuginfo@17.0.4.0.8-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "product": { "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "product_id": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-slowdebug-debuginfo@17.0.4.0.8-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "product": { "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "product_id": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-slowdebug-debuginfo@17.0.4.0.8-2.el8_6?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.src as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.src" }, "product_reference": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.src as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.src" }, "product_reference": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64" }, "product_reference": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le" }, "product_reference": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x" }, "product_reference": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64" }, "product_reference": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21540", "cwe": { "id": "CWE-402", "name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108540" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: class compilation issue (Hotspot, 8281859)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21540" }, { "category": "external", "summary": "RHBZ#2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21540", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21540" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-26T18:26:45+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5726" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: class compilation issue (Hotspot, 8281859)" }, { "cve": "CVE-2022-21541", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108543" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21541" }, { "category": "external", "summary": "RHBZ#2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21541", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21541" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-26T18:26:45+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5726" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)" }, { "cve": "CVE-2022-21549", "cwe": { "id": "CWE-1068", "name": "Inconsistency Between Implementation and Documented Design" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108547" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 17.0.3.1; Oracle GraalVM Enterprise Edition: 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: random exponentials issue (Libraries, 8283875)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21549" }, { "category": "external", "summary": "RHBZ#2108547", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108547" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21549", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21549" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21549", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21549" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-26T18:26:45+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5726" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: random exponentials issue (Libraries, 8283875)" }, { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108554" } ], "notes": [ { "category": "description", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "RHBZ#2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-34169", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-26T18:26:45+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5726" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.src", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el8_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)" } ] }
rhsa-2024_8075
Vulnerability from csaf_redhat
Published
2024-10-14 18:01
Modified
2024-12-17 21:03
Summary
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.19 Security update
Notes
Topic
An update is now available for Red Hat JBoss Enterprise Application Platform 7.4 for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 7.4.19 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.4.18, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.4.19 Release Notes for information about the most significant bug fixes and enhancements included in this release.
Security Fix(es):
* braces: fails to limit the number of characters it can handle [eap-7.4.z] (CVE-2024-4068)
* jose4j: denial of service via specially crafted JWE [eap-7.4.z] (CVE-2023-51775)
* wildfly-domain-http: wildfly: No timeout for EAP management interface may lead to Denial of Service (DoS) [eap-7.4.z] (CVE-2024-4029)
* xalan: integer truncation issue in Xalan-J (JAXP, 8285407) [eap-7.4.z] (CVE-2022-34169)
* org.jsoup/jsoup: The jsoup cleaner may incorrectly sanitize crafted XSS attempts if SafeList.preserveRelativeLinks is enabled [eap-7.4.z] (CVE-2022-36033)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgements, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat JBoss Enterprise Application Platform 7.4 for Red Hat Enterprise Linux 7.\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 7.4.19 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.4.18, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.4.19 Release Notes for information about the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* braces: fails to limit the number of characters it can handle [eap-7.4.z] (CVE-2024-4068)\n\n* jose4j: denial of service via specially crafted JWE [eap-7.4.z] (CVE-2023-51775)\n\n* wildfly-domain-http: wildfly: No timeout for EAP management interface may lead to Denial of Service (DoS) [eap-7.4.z] (CVE-2024-4029)\n\n* xalan: integer truncation issue in Xalan-J (JAXP, 8285407) [eap-7.4.z] (CVE-2022-34169)\n\n* org.jsoup/jsoup: The jsoup cleaner may incorrectly sanitize crafted XSS attempts if SafeList.preserveRelativeLinks is enabled [eap-7.4.z] (CVE-2022-36033)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgements, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:8075", "url": "https://access.redhat.com/errata/RHSA-2024:8075" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4", "url": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4" }, { "category": "external", "summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/index", "url": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/index" }, { "category": "external", "summary": "2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "2127078", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2127078" }, { "category": "external", "summary": "2266921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266921" }, { "category": "external", "summary": "2278615", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278615" }, { "category": "external", "summary": "2280600", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280600" }, { "category": "external", "summary": "JBEAP-27049", "url": "https://issues.redhat.com/browse/JBEAP-27049" }, { "category": "external", "summary": "JBEAP-27357", "url": "https://issues.redhat.com/browse/JBEAP-27357" }, { "category": "external", "summary": "JBEAP-27548", "url": "https://issues.redhat.com/browse/JBEAP-27548" }, { "category": "external", "summary": "JBEAP-27613", "url": "https://issues.redhat.com/browse/JBEAP-27613" }, { "category": "external", "summary": "JBEAP-27658", "url": "https://issues.redhat.com/browse/JBEAP-27658" }, { "category": "external", "summary": "JBEAP-27700", "url": "https://issues.redhat.com/browse/JBEAP-27700" }, { "category": "external", "summary": "JBEAP-27701", "url": "https://issues.redhat.com/browse/JBEAP-27701" }, { "category": "external", "summary": "JBEAP-27713", "url": "https://issues.redhat.com/browse/JBEAP-27713" }, { "category": "external", "summary": "JBEAP-27714", "url": "https://issues.redhat.com/browse/JBEAP-27714" }, { "category": "external", "summary": "JBEAP-27715", "url": "https://issues.redhat.com/browse/JBEAP-27715" }, { "category": "external", "summary": "JBEAP-27746", "url": "https://issues.redhat.com/browse/JBEAP-27746" }, { "category": "external", "summary": "JBEAP-27747", "url": "https://issues.redhat.com/browse/JBEAP-27747" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8075.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.19 Security update", "tracking": { "current_release_date": "2024-12-17T21:03:11+00:00", "generator": { "date": "2024-12-17T21:03:11+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2024:8075", "initial_release_date": "2024-10-14T18:01:59+00:00", "revision_history": [ { "date": "2024-10-14T18:01:59+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-10-14T18:01:59+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T21:03:11+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product": { "name": "Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" }, { "branches": [ { "category": "product_version", "name": "eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.src", "product": { "name": "eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.src", "product_id": "eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-hibernate-validator@6.0.23-2.SP1_redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.src", "product": { "name": "eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.src", "product_id": "eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-xalan-j2@2.7.1-37.redhat_00015.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.src", "product": { "name": "eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.src", "product_id": "eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-ejb-client@4.0.55-1.Final_redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.src", "product": { "name": "eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.src", "product_id": "eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jbossws-cxf@5.4.12-1.Final_redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.src", "product": { "name": "eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.src", "product_id": "eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar@1.5.18-1.Final_redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.src", "product": { "name": "eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.src", "product_id": "eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jsoup@1.15.4-1.redhat_00003.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.src", "product": { "name": "eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.src", "product_id": "eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-cert-helper@1.1.3-1.redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "product": { "name": "eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "product_id": "eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-undertow-jastow@2.0.15-1.Final_redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.src", "product": { "name": "eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.src", "product_id": "eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-hal-console@3.3.24-1.Final_redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.src", "product": { "name": "eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.src", "product_id": "eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-insights-java-client@1.1.3-1.redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.src", "product": { "name": "eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.src", "product_id": "eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration@1.10.0-39.Final_redhat_00039.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.src", "product": { "name": "eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.src", "product_id": "eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly@7.4.19-1.GA_redhat_00002.1.el7eap?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "product_id": "eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-hibernate-validator@6.0.23-2.SP1_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "product_id": "eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-hibernate-validator-cdi@6.0.23-2.SP1_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.noarch", "product": { "name": "eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.noarch", "product_id": "eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-xalan-j2@2.7.1-37.redhat_00015.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-ejb-client@4.0.55-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jbossws-cxf@5.4.12-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar@1.5.18-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-common-api@1.5.18-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-common-impl@1.5.18-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-common-spi@1.5.18-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-core-api@1.5.18-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-core-impl@1.5.18-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-deployers-common@1.5.18-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-jdbc@1.5.18-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-validator@1.5.18-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.noarch", "product": { "name": "eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.noarch", "product_id": "eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jsoup@1.15.4-1.redhat_00003.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-undertow-jastow@2.0.15-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-hal-console@3.3.24-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.noarch", "product_id": "eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-insights-java-client@1.1.3-1.redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration@1.10.0-39.Final_redhat_00039.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-cli@1.10.0-39.Final_redhat_00039.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-core@1.10.0-39.Final_redhat_00039.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "product": { "name": "eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "product_id": "eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly@7.4.19-1.GA_redhat_00002.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "product": { "name": "eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "product_id": "eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk11@7.4.19-1.GA_redhat_00002.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "product": { "name": "eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "product_id": "eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk8@7.4.19-1.GA_redhat_00002.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "product": { "name": "eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "product_id": "eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-javadocs@7.4.19-1.GA_redhat_00002.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "product": { "name": "eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "product_id": "eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-modules@7.4.19-1.GA_redhat_00002.1.el7eap?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "product": { "name": "eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "product_id": "eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-cert-helper@1.1.3-1.redhat_00001.1.el7eap?arch=x86_64" } } }, { "category": "product_version", "name": "eap7-jboss-cert-helper-debuginfo-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "product": { "name": "eap7-jboss-cert-helper-debuginfo-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "product_id": "eap7-jboss-cert-helper-debuginfo-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-cert-helper-debuginfo@1.1.3-1.redhat_00001.1.el7eap?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.src" }, "product_reference": "eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.src" }, "product_reference": "eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.x86_64 as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.x86_64" }, "product_reference": "eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "relates_to_product_reference": "7Server-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-cert-helper-debuginfo-0:1.1.3-1.redhat_00001.1.el7eap.x86_64 as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-jboss-cert-helper-debuginfo-0:1.1.3-1.redhat_00001.1.el7eap.x86_64" }, "product_reference": "eap7-jboss-cert-helper-debuginfo-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "relates_to_product_reference": "7Server-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.src" }, "product_reference": "eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.noarch" }, "product_reference": "eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.src" }, "product_reference": "eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch" }, "product_reference": "eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.src" }, "product_reference": "eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch" }, "product_reference": "eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch" }, "product_reference": "eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch" }, "product_reference": "eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch" }, "product_reference": "eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.noarch" }, "product_reference": "eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.src" }, "product_reference": "eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.4" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108554" } ], "notes": [ { "category": "description", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-debuginfo-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "RHBZ#2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-34169", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-14T18:01:59+00:00", "details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-debuginfo-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8075" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-debuginfo-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)" }, { "cve": "CVE-2022-36033", "cwe": { "id": "CWE-87", "name": "Improper Neutralization of Alternate XSS Syntax" }, "discovery_date": "2022-09-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2127078" } ], "notes": [ { "category": "description", "text": "A flaw was found in jsoup, a Java HTML parser built for HTML editing, cleaning, scraping, and Cross-site scripting (XSS) safety. An issue in jsoup may incorrectly sanitize HTML, including `javascript:` URL expressions, which could allow XSS attacks when a reader subsequently clicks that link. If the non-default `SafeList.preserveRelativeLinks` option is enabled, HTML, including `javascript:` URLs crafted with control characters, will not be sanitized. If the site that this HTML is published on does not set a Content Security Policy, an XSS attack is possible.", "title": "Vulnerability description" }, { "category": "summary", "text": "jsoup: The jsoup cleaner may incorrectly sanitize crafted XSS attempts if SafeList.preserveRelativeLinks is enabled", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-debuginfo-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-36033" }, { "category": "external", "summary": "RHBZ#2127078", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2127078" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-36033", "url": "https://www.cve.org/CVERecord?id=CVE-2022-36033" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-36033", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-36033" } ], "release_date": "2022-08-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-14T18:01:59+00:00", "details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-debuginfo-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8075" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-debuginfo-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jsoup: The jsoup cleaner may incorrectly sanitize crafted XSS attempts if SafeList.preserveRelativeLinks is enabled" }, { "cve": "CVE-2023-51775", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2024-02-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2266921" } ], "notes": [ { "category": "description", "text": "A flaw was found in the jose.4.j (jose4j) library. The JWE key management algorithms based on PBKDF2 require a JOSE Header Parameter called p2c (PBES2 Count). This parameter dictates the number of PBKDF2 iterations needed to derive a CEK wrapping key. Its primary purpose is to intentionally slow down the key derivation function, making password brute-force and dictionary attacks more resource-intensive. However, if an attacker sets the p2c parameter in JWE to a large number, it can cause high computational consumption, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "jose4j: denial of service via specially crafted JWE", "title": "Vulnerability summary" }, { "category": "other", "text": "The vulnerability in the jose4j library, where the \"p2c\" parameter in PBKDF2-based JWE key management algorithms can be manipulated to induce high computational consumption, is classified as moderate severity due to its potential impact on service availability and resource exhaustion. By setting a large value for \"p2c\", an attacker can force the server to perform an excessive number of PBKDF2 iterations during key derivation. This results in increased CPU and memory usage, potentially leading to degraded performance or temporary denial of service.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-debuginfo-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-51775" }, { "category": "external", "summary": "RHBZ#2266921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266921" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-51775", "url": "https://www.cve.org/CVERecord?id=CVE-2023-51775" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-51775", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-51775" } ], "release_date": "2024-02-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-14T18:01:59+00:00", "details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-debuginfo-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8075" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-debuginfo-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-debuginfo-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jose4j: denial of service via specially crafted JWE" }, { "cve": "CVE-2024-4029", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2024-04-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2278615" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Wildfly\u2019s management interface. Due to the lack of limitation of sockets for the management interface, it may be possible to cause a denial of service hitting the nofile limit as there is no possibility to configure or set a maximum number of connections.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly: No timeout for EAP management interface may lead to Denial of Service (DoS)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat rates this as a Low impact since this requires high privileges to jeopardize the system. The management interface is normally internal/local only and not exposed externally.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-debuginfo-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-4029" }, { "category": "external", "summary": "RHBZ#2278615", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278615" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-4029", "url": "https://www.cve.org/CVERecord?id=CVE-2024-4029" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-4029", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4029" } ], "release_date": "2024-05-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-14T18:01:59+00:00", "details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-debuginfo-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8075" }, { "category": "workaround", "details": "Currently there is no available mitigation for this vulnerability. Please make sure to perform updates as they become available.", "product_ids": [ "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-debuginfo-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-debuginfo-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.src" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "wildfly: No timeout for EAP management interface may lead to Denial of Service (DoS)" }, { "cve": "CVE-2024-4068", "cwe": { "id": "CWE-1050", "name": "Excessive Platform Resource Consumption within a Loop" }, "discovery_date": "2024-05-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2280600" } ], "notes": [ { "category": "description", "text": "A flaw was found in the NPM package `braces.` It fails to limit the number of characters it can handle, which could lead to memory exhaustion. In `lib/parse.js,` if a malicious user sends \"imbalanced braces\" as input, the parsing will enter a loop, causing the program to start allocating heap memory without freeing it at any moment of the loop. Eventually, the JavaScript heap limit is reached, and the program will crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "braces: fails to limit the number of characters it can handle", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-debuginfo-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-4068" }, { "category": "external", "summary": "RHBZ#2280600", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280600" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-4068", "url": "https://www.cve.org/CVERecord?id=CVE-2024-4068" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-4068", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4068" }, { "category": "external", "summary": "https://devhub.checkmarx.com/cve-details/CVE-2024-4068/", "url": "https://devhub.checkmarx.com/cve-details/CVE-2024-4068/" }, { "category": "external", "summary": "https://github.com/micromatch/braces/blob/98414f9f1fabe021736e26836d8306d5de747e0d/lib/parse.js#L308", "url": "https://github.com/micromatch/braces/blob/98414f9f1fabe021736e26836d8306d5de747e0d/lib/parse.js#L308" }, { "category": "external", "summary": "https://github.com/micromatch/braces/issues/35", "url": "https://github.com/micromatch/braces/issues/35" } ], "release_date": "2024-03-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-14T18:01:59+00:00", "details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-debuginfo-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8075" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-debuginfo-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.4:eap7-jboss-cert-helper-debuginfo-0:1.1.3-1.redhat_00001.1.el7eap.x86_64", "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el7eap.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "braces: fails to limit the number of characters it can handle" } ] }
rhsa-2024_10208
Vulnerability from csaf_redhat
Published
2024-11-25 00:12
Modified
2024-12-17 23:06
Summary
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.1.8 on RHEL 7 security update
Notes
Topic
A security update is now available for Red Hat JBoss Enterprise Application Platform 7.1 for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 7.1.8 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.1.7, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.1.8 Release Notes for information about the most significant bug fixes and enhancements included in this release.
Security Fix(es):
* bouncycastle: password bypass in OpenBSDBCrypt.checkPassword utility possible [eap-7.1.z] (CVE-2020-28052)
* hsqldb: Untrusted input may lead to RCE attack [eap-7.1.z] (CVE-2022-41853)
* cxf-core: Apache CXF SSRF Vulnerability using the Aegis databinding [eap-7.1.z] (CVE-2024-28752)
* h2: Loading of custom classes from remote servers through JNDI [eap-7.1.z] (CVE-2022-23221)
* CXF: Apache CXF: SSRF Vulnerability [eap-7.1.z] (CVE-2022-46364)
* xalan: integer truncation issue in Xalan-J (JAXP, 8285407) [eap-7.1.z] (CVE-2022-34169)
* log4j: log4j1-chainsaw, log4j1-socketappender: DoS via hashmap logging [eap-7.1.z] (CVE-2023-26464)
* xnio: StackOverflowException when the chain of notifier states becomes problematically big [eap-7.1.z] (CVE-2023-5685)
* server: eap-7: heap exhaustion via deserialization [eap-7.1.z] (CVE-2023-3171)
* netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling [eap-7.1.z] (CVE-2020-7238)
* avro: apache-avro: Apache Avro Java SDK: Memory when deserializing untrusted data in Avro Java SDK [eap-7.1.z] (CVE-2023-39410)
* avro: apache-avro: Schema parsing may trigger Remote Code Execution (RCE) [eap-7.1.z] (CVE-2024-47561)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "A security update is now available for Red Hat JBoss Enterprise Application Platform 7.1 for Red Hat Enterprise Linux 7.\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 7.1.8 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.1.7, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.1.8 Release Notes for information about the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* bouncycastle: password bypass in OpenBSDBCrypt.checkPassword utility possible [eap-7.1.z] (CVE-2020-28052)\n\n* hsqldb: Untrusted input may lead to RCE attack [eap-7.1.z] (CVE-2022-41853)\n\n* cxf-core: Apache CXF SSRF Vulnerability using the Aegis databinding [eap-7.1.z] (CVE-2024-28752)\n\n* h2: Loading of custom classes from remote servers through JNDI [eap-7.1.z] (CVE-2022-23221)\n\n* CXF: Apache CXF: SSRF Vulnerability [eap-7.1.z] (CVE-2022-46364)\n\n* xalan: integer truncation issue in Xalan-J (JAXP, 8285407) [eap-7.1.z] (CVE-2022-34169)\n\n* log4j: log4j1-chainsaw, log4j1-socketappender: DoS via hashmap logging [eap-7.1.z] (CVE-2023-26464)\n\n* xnio: StackOverflowException when the chain of notifier states becomes problematically big [eap-7.1.z] (CVE-2023-5685)\n\n* server: eap-7: heap exhaustion via deserialization [eap-7.1.z] (CVE-2023-3171)\n\n* netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling [eap-7.1.z] (CVE-2020-7238)\n\n* avro: apache-avro: Apache Avro Java SDK: Memory when deserializing untrusted data in Avro Java SDK [eap-7.1.z] (CVE-2023-39410)\n\n* avro: apache-avro: Schema parsing may trigger Remote Code Execution (RCE) [eap-7.1.z] (CVE-2024-47561)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:10208", "url": "https://access.redhat.com/errata/RHSA-2024:10208" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.1", "url": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.1" }, { "category": "external", "summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.1/html-single/installation_guide/index", "url": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.1/html-single/installation_guide/index" }, { "category": "external", "summary": "1796225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796225" }, { "category": "external", "summary": "1912881", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912881" }, { "category": "external", "summary": "2044596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044596" }, { "category": "external", "summary": "2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "2136141", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2136141" }, { "category": "external", "summary": "2155682", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2155682" }, { "category": "external", "summary": "2182864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182864" }, { "category": "external", "summary": "2213639", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2213639" }, { "category": "external", "summary": "2241822", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241822" }, { "category": "external", "summary": "2242521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242521" }, { "category": "external", "summary": "2270732", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270732" }, { "category": "external", "summary": "2316116", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2316116" }, { "category": "external", "summary": "JBEAP-27708", "url": "https://issues.redhat.com/browse/JBEAP-27708" }, { "category": "external", "summary": "JBEAP-28086", "url": "https://issues.redhat.com/browse/JBEAP-28086" }, { "category": "external", "summary": "JBEAP-28130", "url": "https://issues.redhat.com/browse/JBEAP-28130" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_10208.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.1.8 on RHEL 7 security update", "tracking": { "current_release_date": "2024-12-17T23:06:48+00:00", "generator": { "date": "2024-12-17T23:06:48+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2024:10208", "initial_release_date": "2024-11-25T00:12:13+00:00", "revision_history": [ { "date": "2024-11-25T00:12:13+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-11-25T00:12:13+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T23:06:48+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product": { "name": "Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform_eus:7.1::el7" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" }, { "branches": [ { "category": "product_version", "name": "eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "product": { "name": "eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "product_id": "eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jackson-databind@2.8.11.6-1.SP1_redhat_00001.1.ep7.el7?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "product": { "name": "eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "product_id": "eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-xnio-base@3.5.10-1.Final_redhat_00001.1.ep7.el7?arch=src" } } }, { "category": "product_version", "name": "eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "product": { "name": "eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "product_id": "eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-avro@1.7.6-2.redhat_00003.1.ep7.el7?arch=src" } } }, { "category": "product_version", "name": "eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src", "product": { "name": "eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src", "product_id": "eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-xalan-j2@2.7.1-26.redhat_00015.1.ep7.el7?arch=src" } } }, { "category": "product_version", "name": "eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "product": { "name": "eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "product_id": "eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-apache-cxf@3.1.16-3.SP1_redhat_00001.1.ep7.el7?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "product": { "name": "eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "product_id": "eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-marshalling@2.0.15-1.Final_redhat_00001.1.ep7.el7?arch=src" } } }, { "category": "product_version", "name": "eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "product": { "name": "eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "product_id": "eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-bouncycastle@1.68.0-1.redhat_00005.1.ep7.el7?arch=src" } } }, { "category": "product_version", "name": "eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "product": { "name": "eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "product_id": "eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-h2database@1.4.197-2.redhat_00005.1.ep7.el7?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "product": { "name": "eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "product_id": "eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly@7.1.8-2.GA_redhat_00002.1.ep7.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "product": { "name": "eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "product_id": "eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jackson-databind@2.8.11.6-1.SP1_redhat_00001.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "product": { "name": "eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "product_id": "eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-xnio-base@3.5.10-1.Final_redhat_00001.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "product": { "name": "eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "product_id": "eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-avro@1.7.6-2.redhat_00003.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "product": { "name": "eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "product_id": "eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-xalan-j2@2.7.1-26.redhat_00015.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "product": { "name": "eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "product_id": "eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-apache-cxf@3.1.16-3.SP1_redhat_00001.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "product": { "name": "eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "product_id": "eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-apache-cxf-rt@3.1.16-3.SP1_redhat_00001.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "product": { "name": "eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "product_id": "eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-apache-cxf-services@3.1.16-3.SP1_redhat_00001.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "product": { "name": "eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "product_id": "eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-apache-cxf-tools@3.1.16-3.SP1_redhat_00001.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "product": { "name": "eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "product_id": "eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-marshalling@2.0.15-1.Final_redhat_00001.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "product": { "name": "eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "product_id": "eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-marshalling-river@2.0.15-1.Final_redhat_00001.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "product": { "name": "eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "product_id": "eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-bouncycastle@1.68.0-1.redhat_00005.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "product": { "name": "eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "product_id": "eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-bouncycastle-mail@1.68.0-1.redhat_00005.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "product": { "name": "eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "product_id": "eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-bouncycastle-pkix@1.68.0-1.redhat_00005.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "product": { "name": "eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "product_id": "eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-bouncycastle-prov@1.68.0-1.redhat_00005.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "product": { "name": "eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "product_id": "eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-h2database@1.4.197-2.redhat_00005.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "product": { "name": "eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "product_id": "eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly@7.1.8-2.GA_redhat_00002.1.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "product": { "name": "eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "product_id": "eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-modules@7.1.8-2.GA_redhat_00002.1.ep7.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch" }, "product_reference": "eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src" }, "product_reference": "eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch" }, "product_reference": "eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch" }, "product_reference": "eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch" }, "product_reference": "eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch" }, "product_reference": "eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src" }, "product_reference": "eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch" }, "product_reference": "eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src" }, "product_reference": "eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch" }, "product_reference": "eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch" }, "product_reference": "eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch" }, "product_reference": "eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch" }, "product_reference": "eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src" }, "product_reference": "eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch" }, "product_reference": "eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src" }, "product_reference": "eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch" }, "product_reference": "eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src" }, "product_reference": "eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch" }, "product_reference": "eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch" }, "product_reference": "eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src" }, "product_reference": "eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch" }, "product_reference": "eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src" }, "product_reference": "eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch" }, "product_reference": "eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch" }, "product_reference": "eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" }, "product_reference": "eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src", "relates_to_product_reference": "7Server-JBEAP-7.1-EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-7238", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2020-01-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1796225" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty, where it mishandles Transfer-Encoding whitespace. This flaw allows HTTP Request Smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform ships a vulnerable netty library as part of the logging-elasticsearch5 container. ElasticSearch\u0027s security team has stated that the previous vulnerability, CVE-2019-16869, does not poses a substantial practical threat to ElasticSearch 6 [1]. We agree that this issue would be difficult to exploit both these vulnerabilities on OpenShift Container Platform, so we\u0027re reducing the impact of this issue to moderate and may fix it in the future release.\n\nRed Hat Satellite ships vulnerable netty version embedded in Candlepin, however, is not directly vulnerable since HTTP requests are handled by Tomcat and not netty.\n\n[1] https://github.com/elastic/elasticsearch/issues/49396", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-7238" }, { "category": "external", "summary": "RHBZ#1796225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1796225" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7238", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7238" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7238", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7238" }, { "category": "external", "summary": "https://netty.io/news/2019/12/18/4-1-44-Final.html", "url": "https://netty.io/news/2019/12/18/4-1-44-Final.html" } ], "release_date": "2020-01-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-25T00:12:13+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:10208" }, { "category": "workaround", "details": "* Use HTTP/2 instead (clear boundaries between requests)\n* Disable reuse of backend connections eg. ```http-reuse never``` in HAProxy or whatever equivalent LB settings", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling" }, { "cve": "CVE-2020-28052", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2021-01-05T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1912881" } ], "notes": [ { "category": "description", "text": "A flaw was found in bouncycastle. The OpenBSDBCrypt.checkPassword utility method compared incorrect data when checking the password allowing incorrect passwords to indicate they were matching with previously hashed ones that were different. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "bouncycastle: password bypass in OpenBSDBCrypt.checkPassword utility possible", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch" ], "known_not_affected": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-28052" }, { "category": "external", "summary": "RHBZ#1912881", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912881" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-28052", "url": "https://www.cve.org/CVERecord?id=CVE-2020-28052" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-28052", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-28052" } ], "release_date": "2020-12-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-25T00:12:13+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:10208" }, { "category": "workaround", "details": "Users unable to upgrade to version 1.67 or greater can copy the `OpenBSDBCrypt.doCheckPassword()` method implementation (https://github.com/bcgit/bc-java/blob/r1rv67/core/src/main/java/org/bouncycastle/crypto/generators/OpenBSDBCrypt.java#L259-L343) into their own utility class and supplement it with the required methods and variables as required", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "bouncycastle: password bypass in OpenBSDBCrypt.checkPassword utility possible" }, { "cve": "CVE-2022-23221", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2022-01-19T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2044596" } ], "notes": [ { "category": "description", "text": "A flaw was found in the H2 Console. This flaw allows remote attackers to execute arbitrary code via a JDBC URL, concatenating with a substring that allows remote code execution by using a script.", "title": "Vulnerability description" }, { "category": "summary", "text": "h2: Loading of custom classes from remote servers through JNDI", "title": "Vulnerability summary" }, { "category": "other", "text": "In OpenShift Container Platform (OCP) the openshift-enterprise-3.11/metrics-hawkular-metrics-container container image ships a vulnerable version of h2 as part of the underlying images, but as it uses standard configuration and Console is not enabled/started by default, therefore the impact by this vulnerability is LOW and will not be fixed as OCP 3.x has already reached End of Full Support.\n\n[1] https://access.redhat.com/support/policy/updates/openshift_noncurrent", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src" ], "known_not_affected": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23221" }, { "category": "external", "summary": "RHBZ#2044596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044596" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23221", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23221" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23221", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23221" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-45hx-wfhj-473x", "url": "https://github.com/advisories/GHSA-45hx-wfhj-473x" } ], "release_date": "2022-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-25T00:12:13+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:10208" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "h2: Loading of custom classes from remote servers through JNDI" }, { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108554" } ], "notes": [ { "category": "description", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "RHBZ#2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-34169", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-25T00:12:13+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:10208" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)" }, { "cve": "CVE-2022-41853", "cwe": { "id": "CWE-470", "name": "Use of Externally-Controlled Input to Select Classes or Code (\u0027Unsafe Reflection\u0027)" }, "discovery_date": "2022-10-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2136141" } ], "notes": [ { "category": "description", "text": "A flaw was found in the HSQLDB package. This flaw allows untrusted inputs to execute remote code due to any static method of any Java class in the classpath, resulting in code execution by default.", "title": "Vulnerability description" }, { "category": "summary", "text": "hsqldb: Untrusted input may lead to RCE attack", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-41853" }, { "category": "external", "summary": "RHBZ#2136141", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2136141" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-41853", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41853" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41853", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41853" }, { "category": "external", "summary": "http://hsqldb.org/doc/2.0/guide/sqlroutines-chapt.html#src_jrt_access_control", "url": "http://hsqldb.org/doc/2.0/guide/sqlroutines-chapt.html#src_jrt_access_control" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-77xx-rxvh-q682", "url": "https://github.com/advisories/GHSA-77xx-rxvh-q682" } ], "release_date": "2022-10-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-25T00:12:13+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:10208" }, { "category": "workaround", "details": "By default, the static methods of any class that is on the classpath are available for use and can compromise security in some systems. The optional Java system property, hsqldb.method_class_names, allows preventing access to classes other than java.lang.Math or specifying a semicolon-separated list of allowed classes. A property value that ends with .* is treated as a wild card and allows access to all class or method names formed by substitution of the * (asterisk).\n\nIn the example below, the property has been included as an argument to the Java command.\n\n java -Dhsqldb.method_class_names=\"org.me.MyClass;org.you.YourClass;org.you.lib.*\" [the rest of the command line]\n\nThe above example allows access to the methods in the two classes: org.me.MyClass and org.you.YourClass together with all the classes in the org.you.lib package. Note that if the property is not defined, no access control is performed at this level.\n\nThe user who creates a Java routine must have the relevant access privileges on the tables that are used inside the Java method.\n\nOnce the routine has been defined, the normal database access control applies to its user. The routine can be executed only by those users who have been granted EXECUTE privileges on it. Access to routines can be granted to users with GRANT EXECUTE or GRANT ALL. For example, GRANT EXECUTE ON myroutine TO PUBLIC.\n\nIn hsqldb 2.7.1, all classes by default are not accessible, except those in java.lang.Math and need to be manually enabled.", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "hsqldb: Untrusted input may lead to RCE attack" }, { "cve": "CVE-2022-46364", "cwe": { "id": "CWE-918", "name": "Server-Side Request Forgery (SSRF)" }, "discovery_date": "2022-12-21T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2155682" } ], "notes": [ { "category": "description", "text": "A SSRF vulnerability was found in Apache CXF. This issue occurs when parsing the href attribute of XOP:Include in MTOM requests, allowing an attacker to perform SSRF style attacks on webservices that take at least one parameter of any type.", "title": "Vulnerability description" }, { "category": "summary", "text": "CXF: SSRF Vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Integration Camel Quarkus does not support CXF extensions and so is affected at a reduced impact of Moderate.\nThe RHSSO server does not ship Apache CXF. The component mentioned in CVE-2022-46364 is a transitive dependency coming from Fuse adapters and the test suite.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch" ], "known_not_affected": [ "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-46364" }, { "category": "external", "summary": "RHBZ#2155682", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2155682" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-46364", "url": "https://www.cve.org/CVERecord?id=CVE-2022-46364" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46364", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46364" }, { "category": "external", "summary": "https://cxf.apache.org/security-advisories.data/CVE-2022-46364.txt?version=1\u0026modificationDate=1670944472739\u0026api=v2", "url": "https://cxf.apache.org/security-advisories.data/CVE-2022-46364.txt?version=1\u0026modificationDate=1670944472739\u0026api=v2" } ], "release_date": "2022-12-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-25T00:12:13+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:10208" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "CXF: SSRF Vulnerability" }, { "cve": "CVE-2023-3171", "cwe": { "id": "CWE-789", "name": "Memory Allocation with Excessive Size Value" }, "discovery_date": "2023-04-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2213639" } ], "notes": [ { "category": "description", "text": "A flaw was found in EAP-7 during deserialization of certain classes, which permits instantiation of HashMap and HashTable with no checks on resources consumed. This issue could allow an attacker to submit malicious requests using these classes, which could eventually exhaust the heap and result in a Denial of Service.", "title": "Vulnerability description" }, { "category": "summary", "text": "eap-7: heap exhaustion via deserialization", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-3171" }, { "category": "external", "summary": "RHBZ#2213639", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2213639" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-3171", "url": "https://www.cve.org/CVERecord?id=CVE-2023-3171" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-3171", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-3171" } ], "release_date": "2023-10-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-25T00:12:13+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:10208" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "eap-7: heap exhaustion via deserialization" }, { "cve": "CVE-2023-5685", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2023-10-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241822" } ], "notes": [ { "category": "description", "text": "A flaw was found in XNIO. The XNIO NotifierState that can cause a Stack Overflow Exception when the chain of notifier states becomes problematically large can lead to uncontrolled resource management and a possible denial of service (DoS).", "title": "Vulnerability description" }, { "category": "summary", "text": "xnio: StackOverflowException when the chain of notifier states becomes problematically big", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat rates this vulnerability as an Important impact as the uncontrolled resource consumption may lead to Denial of Service (DoS). This might be intentioned by an attacker who is looking to jeopardize an environment.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-5685" }, { "category": "external", "summary": "RHBZ#2241822", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241822" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-5685", "url": "https://www.cve.org/CVERecord?id=CVE-2023-5685" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-5685", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5685" } ], "release_date": "2024-03-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-25T00:12:13+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:10208" }, { "category": "workaround", "details": "There is currently no mitigation available for this vulnerability. Please keep the packages up-to-date as the updates become available.", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xnio: StackOverflowException when the chain of notifier states becomes problematically big" }, { "cve": "CVE-2023-26464", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2023-03-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2182864" } ], "notes": [ { "category": "description", "text": "A flaw was found in Chainsaw and SocketAppender components with Log4j 1.x on JRE, less than 1.7. This issue may allow an attacker to use a logging entry with a specially-crafted hashmap or hashtable, depending on which logging component is in use, to process and exhaust the available memory in the virtual machine, resulting in a Denial of Service when the object is deserialized. This issue affects Apache Log4j before version 2.", "title": "Vulnerability description" }, { "category": "summary", "text": "log4j1-socketappender: DoS via hashmap logging", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 8 and 9 security impacts have been reduced to Low as they do not enable the vulnerable JDK by default.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-26464" }, { "category": "external", "summary": "RHBZ#2182864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182864" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-26464", "url": "https://www.cve.org/CVERecord?id=CVE-2023-26464" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-26464", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-26464" }, { "category": "external", "summary": "https://www.ibm.com/support/pages/security-bulletin-vulnerability-log4j-1216jar-affect-ibm-operations-analytics-log-analysis-cve-2023-26464", "url": "https://www.ibm.com/support/pages/security-bulletin-vulnerability-log4j-1216jar-affect-ibm-operations-analytics-log-analysis-cve-2023-26464" } ], "release_date": "2023-03-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-25T00:12:13+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:10208" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "log4j1-socketappender: DoS via hashmap logging" }, { "cve": "CVE-2023-39410", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2023-10-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2242521" } ], "notes": [ { "category": "description", "text": "A flaw was found in apache-avro. When deserializing untrusted or corrupted data, it is possible for a reader to consume memory beyond the allowed constraints, leading to an out-of-memory error and a denial of service on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-avro: Apache Avro Java SDK: Memory when deserializing untrusted data in Avro Java SDK", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-39410" }, { "category": "external", "summary": "RHBZ#2242521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242521" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-39410", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39410" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39410", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39410" }, { "category": "external", "summary": "https://issues.apache.org/jira/browse/AVRO-3819", "url": "https://issues.apache.org/jira/browse/AVRO-3819" } ], "release_date": "2023-09-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-25T00:12:13+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:10208" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "apache-avro: Apache Avro Java SDK: Memory when deserializing untrusted data in Avro Java SDK" }, { "cve": "CVE-2024-28752", "cwe": { "id": "CWE-918", "name": "Server-Side Request Forgery (SSRF)" }, "discovery_date": "2024-03-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2270732" } ], "notes": [ { "category": "description", "text": "A server-side request forgery (SSRF) vulnerability was found in Apache CXF. This issue occurs in attacks on webservices that take at least one parameter of any type, and when Aegisdatabind is used. Users of other data bindings including the default databinding are not impacted.", "title": "Vulnerability description" }, { "category": "summary", "text": "cxf-core: Apache CXF SSRF Vulnerability using the Aegis databinding", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat rates this as an Important impact due to the fact this requires Aegis databind, which is not the default databinding for Apache CXF.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-28752" }, { "category": "external", "summary": "RHBZ#2270732", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270732" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-28752", "url": "https://www.cve.org/CVERecord?id=CVE-2024-28752" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-28752", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-28752" }, { "category": "external", "summary": "https://cxf.apache.org/security-advisories.data/CVE-2024-28752.txt", "url": "https://cxf.apache.org/security-advisories.data/CVE-2024-28752.txt" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-qmgx-j96g-4428", "url": "https://github.com/advisories/GHSA-qmgx-j96g-4428" } ], "release_date": "2024-03-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-25T00:12:13+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:10208" }, { "category": "workaround", "details": "No mitigation is currently available for this vulnerability. Please make sure to update as the fixes become available.", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "cxf-core: Apache CXF SSRF Vulnerability using the Aegis databinding" }, { "cve": "CVE-2024-47561", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2024-10-02T14:04:06.018000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2316116" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Apache Avro. The project is affected and at risk if it accepts an org.apache.Avro/avroAvro schema for parsing provided by an end user. This flaw allows an attacker to trigger remote code execution by using the special \"java-class\" attribute.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-avro: Schema parsing may trigger Remote Code Execution (RCE)", "title": "Vulnerability summary" }, { "category": "other", "text": "The Red Hat build of Apache Camel K 1.10 was rated Important as it allows users to provide an Avro schema for parsing. Note that this functionality is limited to authenticated users.\n\nRed Hat Single Sign-On 7 ships the affected component in its maven repository but does not use it in the product. As such it is affected but not vulnerable to the flaw, and is assessed at Moderate security impact.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-47561" }, { "category": "external", "summary": "RHBZ#2316116", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2316116" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-47561", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47561" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47561", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47561" } ], "release_date": "2024-10-03T12:20:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-25T00:12:13+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:10208" }, { "category": "workaround", "details": "1. Avoid parsing user-provided schemas.\n2. Ensure proper input validation and sanitization of schemas before parsing.\n3. Monitor systems for any unusual activities that may indicate exploitation attempts.\n4. Apply the principle of least privilege to minimize the potential impact of successful exploits.", "product_ids": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-rt-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-services-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-apache-cxf-tools-0:3.1.16-3.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-avro-0:1.7.6-2.redhat_00003.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-0:1.68.0-1.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-mail-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-pkix-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-bouncycastle-prov-0:1.68.0-1.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-h2database-0:1.4.197-2.redhat_00005.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jackson-databind-0:2.8.11.6-1.SP1_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.10-1.Final_redhat_00001.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.src", "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.8-2.GA_redhat_00002.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.noarch", "7Server-JBEAP-7.1-EUS:eap7-xalan-j2-0:2.7.1-26.redhat_00015.1.ep7.el7.src" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "apache-avro: Schema parsing may trigger Remote Code Execution (RCE)" } ] }
rhsa-2022_5687
Vulnerability from csaf_redhat
Published
2022-07-21 16:56
Modified
2024-11-26 03:08
Summary
Red Hat Security Advisory: java-11-openjdk security, bug fix, and enhancement update
Notes
Topic
An update for java-11-openjdk is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.
The following packages have been upgraded to a later upstream version: java-11-openjdk (11.0.16.0.8). (BZ#2083258)
Security Fix(es):
* OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) (CVE-2022-34169)
* OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540)
* OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for java-11-openjdk is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.\n\nThe following packages have been upgraded to a later upstream version: java-11-openjdk (11.0.16.0.8). (BZ#2083258)\n\nSecurity Fix(es):\n\n* OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) (CVE-2022-34169)\n\n* OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540)\n\n* OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:5687", "url": "https://access.redhat.com/errata/RHSA-2022:5687" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2083258", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2083258" }, { "category": "external", "summary": "2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5687.json" } ], "title": "Red Hat Security Advisory: java-11-openjdk security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-11-26T03:08:58+00:00", "generator": { "date": "2024-11-26T03:08:58+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2022:5687", "initial_release_date": "2022-07-21T16:56:38+00:00", "revision_history": [ { "date": "2022-07-21T16:56:38+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-07-21T16:56:38+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-26T03:08:58+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "product": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "product_id": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.16.0.8-1.el7_9?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "product": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "product_id": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.16.0.8-1.el7_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "product": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "product_id": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless@11.0.16.0.8-1.el7_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "product": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "product_id": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debuginfo@11.0.16.0.8-1.el7_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "product": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "product_id": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo@11.0.16.0.8-1.el7_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "product": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "product_id": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel@11.0.16.0.8-1.el7_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "product": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "product_id": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc@11.0.16.0.8-1.el7_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "product": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "product_id": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc-zip@11.0.16.0.8-1.el7_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "product": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "product_id": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods@11.0.16.0.8-1.el7_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "product": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "product_id": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src@11.0.16.0.8-1.el7_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "product": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "product_id": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs@11.0.16.0.8-1.el7_9?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "product": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "product_id": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.16.0.8-1.el7_9?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "product": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "product_id": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless@11.0.16.0.8-1.el7_9?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "product": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "product_id": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debuginfo@11.0.16.0.8-1.el7_9?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "product": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "product_id": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo@11.0.16.0.8-1.el7_9?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "product": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "product_id": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel@11.0.16.0.8-1.el7_9?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "product": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "product_id": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc@11.0.16.0.8-1.el7_9?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "product": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "product_id": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc-zip@11.0.16.0.8-1.el7_9?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "product": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "product_id": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods@11.0.16.0.8-1.el7_9?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "product": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "product_id": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src@11.0.16.0.8-1.el7_9?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "product": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "product_id": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs@11.0.16.0.8-1.el7_9?arch=i686\u0026epoch=1" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "product": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "product_id": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.16.0.8-1.el7_9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "product": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "product_id": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel@11.0.16.0.8-1.el7_9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "product": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "product_id": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless@11.0.16.0.8-1.el7_9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "product": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "product_id": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debuginfo@11.0.16.0.8-1.el7_9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "product": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "product_id": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo@11.0.16.0.8-1.el7_9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "product": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "product_id": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc@11.0.16.0.8-1.el7_9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "product": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "product_id": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc-zip@11.0.16.0.8-1.el7_9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "product": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "product_id": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods@11.0.16.0.8-1.el7_9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "product": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "product_id": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src@11.0.16.0.8-1.el7_9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "product": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "product_id": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs@11.0.16.0.8-1.el7_9?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "product": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "product_id": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.16.0.8-1.el7_9?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "product": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "product_id": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel@11.0.16.0.8-1.el7_9?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "product": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "product_id": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless@11.0.16.0.8-1.el7_9?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "product": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "product_id": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debuginfo@11.0.16.0.8-1.el7_9?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "product": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "product_id": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo@11.0.16.0.8-1.el7_9?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "product": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "product_id": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc@11.0.16.0.8-1.el7_9?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "product": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "product_id": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc-zip@11.0.16.0.8-1.el7_9?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "product": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "product_id": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods@11.0.16.0.8-1.el7_9?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "product": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "product_id": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src@11.0.16.0.8-1.el7_9?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "product": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "product_id": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs@11.0.16.0.8-1.el7_9?arch=ppc64\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "product": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "product_id": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.16.0.8-1.el7_9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "product": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "product_id": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel@11.0.16.0.8-1.el7_9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "product": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "product_id": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless@11.0.16.0.8-1.el7_9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "product": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "product_id": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debuginfo@11.0.16.0.8-1.el7_9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "product": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "product_id": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo@11.0.16.0.8-1.el7_9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "product": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "product_id": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc@11.0.16.0.8-1.el7_9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "product": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "product_id": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc-zip@11.0.16.0.8-1.el7_9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "product": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "product_id": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods@11.0.16.0.8-1.el7_9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "product": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "product_id": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src@11.0.16.0.8-1.el7_9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "product": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "product_id": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs@11.0.16.0.8-1.el7_9?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21540", "cwe": { "id": "CWE-402", "name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108540" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: class compilation issue (Hotspot, 8281859)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21540" }, { "category": "external", "summary": "RHBZ#2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21540", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21540" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-21T16:56:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5687" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: class compilation issue (Hotspot, 8281859)" }, { "cve": "CVE-2022-21541", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108543" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21541" }, { "category": "external", "summary": "RHBZ#2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21541", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21541" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-21T16:56:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5687" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)" }, { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108554" } ], "notes": [ { "category": "description", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "RHBZ#2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-34169", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-21T16:56:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5687" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Client-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Client-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Client-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Client-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7ComputeNode-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Server-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Server-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Server-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Server-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Workstation-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.src", "7Workstation-optional-7.9.Z:java-11-openjdk-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-demo-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-devel-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-headless-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-jmods-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-src-1:11.0.16.0.8-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)" } ] }
rhsa-2022_5683
Vulnerability from csaf_redhat
Published
2022-07-21 15:29
Modified
2024-11-26 03:08
Summary
Red Hat Security Advisory: java-11-openjdk security, bug fix, and enhancement update
Notes
Topic
An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.
The following packages have been upgraded to a later upstream version: java-11-openjdk (11.0.16.0.8). (BZ#2084649)
Security Fix(es):
* OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) (CVE-2022-34169)
* OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540)
* OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* rh1991003 patch breaks sun.security.pkcs11.wrapper.PKCS11.getInstance() [rhel-8, openjdk-11] (BZ#2099917)
* Revert to disabling system security properties and FIPS mode support together [rhel-8, openjdk-11] (BZ#2108248)
* SecretKey generate/import operations don't add the CKA_SIGN attribute in FIPS mode [rhel-8, openjdk-11] (BZ#2108251)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.\n\nThe following packages have been upgraded to a later upstream version: java-11-openjdk (11.0.16.0.8). (BZ#2084649)\n\nSecurity Fix(es):\n\n* OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) (CVE-2022-34169)\n\n* OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540)\n\n* OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* rh1991003 patch breaks sun.security.pkcs11.wrapper.PKCS11.getInstance() [rhel-8, openjdk-11] (BZ#2099917)\n\n* Revert to disabling system security properties and FIPS mode support together [rhel-8, openjdk-11] (BZ#2108248)\n\n* SecretKey generate/import operations don\u0027t add the CKA_SIGN attribute in FIPS mode [rhel-8, openjdk-11] (BZ#2108251)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:5683", "url": "https://access.redhat.com/errata/RHSA-2022:5683" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2084649", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084649" }, { "category": "external", "summary": "2099917", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099917" }, { "category": "external", "summary": "2108248", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108248" }, { "category": "external", "summary": "2108251", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108251" }, { "category": "external", "summary": "2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5683.json" } ], "title": "Red Hat Security Advisory: java-11-openjdk security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-11-26T03:08:42+00:00", "generator": { "date": "2024-11-26T03:08:42+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2022:5683", "initial_release_date": "2022-07-21T15:29:58+00:00", "revision_history": [ { "date": "2022-07-21T15:29:58+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-07-21T15:29:58+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-26T03:08:42+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux CRB (v. 8)", "product": { "name": "Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::crb" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_6.src", "product": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_6.src", "product_id": "java-11-openjdk-1:11.0.16.0.8-1.el8_6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.16.0.8-1.el8_6?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_6.aarch64", "product": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_6.aarch64", "product_id": "java-11-openjdk-1:11.0.16.0.8-1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.16.0.8-1.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.aarch64", "product": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.aarch64", "product_id": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo@11.0.16.0.8-1.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.aarch64", "product": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.aarch64", "product_id": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel@11.0.16.0.8-1.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.aarch64", "product": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.aarch64", "product_id": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless@11.0.16.0.8-1.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.aarch64", "product": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.aarch64", "product_id": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc@11.0.16.0.8-1.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.aarch64", "product": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.aarch64", "product_id": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc-zip@11.0.16.0.8-1.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.aarch64", "product": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.aarch64", "product_id": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods@11.0.16.0.8-1.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.aarch64", "product": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.aarch64", "product_id": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src@11.0.16.0.8-1.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.aarch64", "product": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.aarch64", "product_id": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs@11.0.16.0.8-1.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.aarch64", "product": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.aarch64", "product_id": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debugsource@11.0.16.0.8-1.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "product": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "product_id": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debuginfo@11.0.16.0.8-1.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "product": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "product_id": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-debuginfo@11.0.16.0.8-1.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "product": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "product_id": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-debuginfo@11.0.16.0.8-1.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product": { "name": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product_id": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo-fastdebug@11.0.16.0.8-1.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product": { "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product_id": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo-slowdebug@11.0.16.0.8-1.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product": { "name": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product_id": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-fastdebug@11.0.16.0.8-1.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product": { "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product_id": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-slowdebug@11.0.16.0.8-1.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product": { "name": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product_id": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-fastdebug@11.0.16.0.8-1.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product": { "name": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product_id": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-fastdebug@11.0.16.0.8-1.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product": { "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product_id": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-slowdebug@11.0.16.0.8-1.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product": { "name": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product_id": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods-fastdebug@11.0.16.0.8-1.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product": { "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product_id": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods-slowdebug@11.0.16.0.8-1.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product": { "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product_id": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-slowdebug@11.0.16.0.8-1.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product": { "name": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product_id": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src-fastdebug@11.0.16.0.8-1.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product": { "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product_id": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src-slowdebug@11.0.16.0.8-1.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product": { "name": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product_id": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs-fastdebug@11.0.16.0.8-1.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product": { "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product_id": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs-slowdebug@11.0.16.0.8-1.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "product": { "name": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "product_id": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-fastdebug-debuginfo@11.0.16.0.8-1.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "product": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "product_id": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-slowdebug-debuginfo@11.0.16.0.8-1.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "product": { "name": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "product_id": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-fastdebug-debuginfo@11.0.16.0.8-1.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "product": { "name": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "product_id": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-fastdebug-debuginfo@11.0.16.0.8-1.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "product": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "product_id": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-slowdebug-debuginfo@11.0.16.0.8-1.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "product": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "product_id": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-slowdebug-debuginfo@11.0.16.0.8-1.el8_6?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_6.ppc64le", "product": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_6.ppc64le", "product_id": "java-11-openjdk-1:11.0.16.0.8-1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.16.0.8-1.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.ppc64le", "product": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.ppc64le", "product_id": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo@11.0.16.0.8-1.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.ppc64le", "product": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.ppc64le", "product_id": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel@11.0.16.0.8-1.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.ppc64le", "product": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.ppc64le", "product_id": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless@11.0.16.0.8-1.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.ppc64le", "product": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.ppc64le", "product_id": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc@11.0.16.0.8-1.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.ppc64le", "product": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.ppc64le", "product_id": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc-zip@11.0.16.0.8-1.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.ppc64le", "product": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.ppc64le", "product_id": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods@11.0.16.0.8-1.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.ppc64le", "product": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.ppc64le", "product_id": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src@11.0.16.0.8-1.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.ppc64le", "product": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.ppc64le", "product_id": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs@11.0.16.0.8-1.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.ppc64le", "product": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.ppc64le", "product_id": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debugsource@11.0.16.0.8-1.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "product": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "product_id": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debuginfo@11.0.16.0.8-1.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "product": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "product_id": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-debuginfo@11.0.16.0.8-1.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "product": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "product_id": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-debuginfo@11.0.16.0.8-1.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product": { "name": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product_id": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo-fastdebug@11.0.16.0.8-1.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product": { "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product_id": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo-slowdebug@11.0.16.0.8-1.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product": { "name": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product_id": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-fastdebug@11.0.16.0.8-1.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product": { "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product_id": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-slowdebug@11.0.16.0.8-1.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product": { "name": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product_id": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-fastdebug@11.0.16.0.8-1.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product": { "name": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product_id": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-fastdebug@11.0.16.0.8-1.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product": { "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product_id": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-slowdebug@11.0.16.0.8-1.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product": { "name": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product_id": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods-fastdebug@11.0.16.0.8-1.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product": { "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product_id": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods-slowdebug@11.0.16.0.8-1.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product": { "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product_id": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-slowdebug@11.0.16.0.8-1.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product": { "name": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product_id": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src-fastdebug@11.0.16.0.8-1.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product": { "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product_id": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src-slowdebug@11.0.16.0.8-1.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product": { "name": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product_id": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs-fastdebug@11.0.16.0.8-1.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product": { "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product_id": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs-slowdebug@11.0.16.0.8-1.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "product": { "name": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "product_id": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-fastdebug-debuginfo@11.0.16.0.8-1.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "product": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "product_id": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-slowdebug-debuginfo@11.0.16.0.8-1.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "product": { "name": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "product_id": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-fastdebug-debuginfo@11.0.16.0.8-1.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "product": { "name": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "product_id": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-fastdebug-debuginfo@11.0.16.0.8-1.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "product": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "product_id": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-slowdebug-debuginfo@11.0.16.0.8-1.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "product": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "product_id": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-slowdebug-debuginfo@11.0.16.0.8-1.el8_6?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_6.x86_64", "product": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_6.x86_64", "product_id": "java-11-openjdk-1:11.0.16.0.8-1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.16.0.8-1.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.x86_64", "product": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.x86_64", "product_id": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo@11.0.16.0.8-1.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.x86_64", "product": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.x86_64", "product_id": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel@11.0.16.0.8-1.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.x86_64", "product": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.x86_64", "product_id": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless@11.0.16.0.8-1.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.x86_64", "product": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.x86_64", "product_id": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc@11.0.16.0.8-1.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.x86_64", "product": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.x86_64", "product_id": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc-zip@11.0.16.0.8-1.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.x86_64", "product": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.x86_64", "product_id": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods@11.0.16.0.8-1.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.x86_64", "product": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.x86_64", "product_id": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src@11.0.16.0.8-1.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.x86_64", "product": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.x86_64", "product_id": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs@11.0.16.0.8-1.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.x86_64", "product": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.x86_64", "product_id": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debugsource@11.0.16.0.8-1.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "product": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "product_id": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debuginfo@11.0.16.0.8-1.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "product": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "product_id": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-debuginfo@11.0.16.0.8-1.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "product": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "product_id": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-debuginfo@11.0.16.0.8-1.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product": { "name": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product_id": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo-fastdebug@11.0.16.0.8-1.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product": { "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product_id": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo-slowdebug@11.0.16.0.8-1.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product": { "name": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product_id": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-fastdebug@11.0.16.0.8-1.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product": { "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product_id": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-slowdebug@11.0.16.0.8-1.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product": { "name": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product_id": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-fastdebug@11.0.16.0.8-1.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product": { "name": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product_id": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-fastdebug@11.0.16.0.8-1.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product": { "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product_id": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-slowdebug@11.0.16.0.8-1.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product": { "name": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product_id": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods-fastdebug@11.0.16.0.8-1.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product": { "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product_id": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods-slowdebug@11.0.16.0.8-1.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product": { "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product_id": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-slowdebug@11.0.16.0.8-1.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product": { "name": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product_id": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src-fastdebug@11.0.16.0.8-1.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product": { "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product_id": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src-slowdebug@11.0.16.0.8-1.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product": { "name": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product_id": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs-fastdebug@11.0.16.0.8-1.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product": { "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product_id": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs-slowdebug@11.0.16.0.8-1.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "product": { "name": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "product_id": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-fastdebug-debuginfo@11.0.16.0.8-1.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "product": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "product_id": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-slowdebug-debuginfo@11.0.16.0.8-1.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "product": { "name": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "product_id": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-fastdebug-debuginfo@11.0.16.0.8-1.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "product": { "name": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "product_id": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-fastdebug-debuginfo@11.0.16.0.8-1.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "product": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "product_id": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-slowdebug-debuginfo@11.0.16.0.8-1.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "product": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "product_id": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-slowdebug-debuginfo@11.0.16.0.8-1.el8_6?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_6.s390x", "product": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_6.s390x", "product_id": "java-11-openjdk-1:11.0.16.0.8-1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.16.0.8-1.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.s390x", "product": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.s390x", "product_id": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo@11.0.16.0.8-1.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.s390x", "product": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.s390x", "product_id": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel@11.0.16.0.8-1.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.s390x", "product": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.s390x", "product_id": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless@11.0.16.0.8-1.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.s390x", "product": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.s390x", "product_id": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc@11.0.16.0.8-1.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.s390x", "product": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.s390x", "product_id": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc-zip@11.0.16.0.8-1.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.s390x", "product": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.s390x", "product_id": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods@11.0.16.0.8-1.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.s390x", "product": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.s390x", "product_id": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src@11.0.16.0.8-1.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.s390x", "product": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.s390x", "product_id": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs@11.0.16.0.8-1.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.s390x", "product": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.s390x", "product_id": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debugsource@11.0.16.0.8-1.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "product": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "product_id": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debuginfo@11.0.16.0.8-1.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "product": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "product_id": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-debuginfo@11.0.16.0.8-1.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "product": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "product_id": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-debuginfo@11.0.16.0.8-1.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "product": { "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "product_id": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo-slowdebug@11.0.16.0.8-1.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "product": { "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "product_id": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-slowdebug@11.0.16.0.8-1.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "product": { "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "product_id": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-slowdebug@11.0.16.0.8-1.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "product": { "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "product_id": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods-slowdebug@11.0.16.0.8-1.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "product": { "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "product_id": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-slowdebug@11.0.16.0.8-1.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "product": { "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "product_id": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src-slowdebug@11.0.16.0.8-1.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "product": { "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "product_id": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs-slowdebug@11.0.16.0.8-1.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "product": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "product_id": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-slowdebug-debuginfo@11.0.16.0.8-1.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "product": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "product_id": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-slowdebug-debuginfo@11.0.16.0.8-1.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "product": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "product_id": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-slowdebug-debuginfo@11.0.16.0.8-1.el8_6?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_6.src as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.src" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el8_6.src", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_6.src as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.src" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el8_6.src", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64" }, "product_reference": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le" }, "product_reference": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.s390x" }, "product_reference": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64" }, "product_reference": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21540", "cwe": { "id": "CWE-402", "name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108540" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: class compilation issue (Hotspot, 8281859)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.src", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.src", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21540" }, { "category": "external", "summary": "RHBZ#2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21540", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21540" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-21T15:29:58+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.src", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.src", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5683" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.src", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.src", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: class compilation issue (Hotspot, 8281859)" }, { "cve": "CVE-2022-21541", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108543" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.src", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.src", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21541" }, { "category": "external", "summary": "RHBZ#2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21541", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21541" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-21T15:29:58+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.src", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.src", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5683" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.src", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.src", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)" }, { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108554" } ], "notes": [ { "category": "description", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.src", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.src", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "RHBZ#2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-34169", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-21T15:29:58+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.src", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.src", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5683" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.src", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.src", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)" } ] }
rhsa-2024_8823
Vulnerability from csaf_redhat
Published
2024-11-04 20:13
Modified
2024-12-13 14:17
Summary
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.0.4 Security update
Notes
Topic
A security update is now available for Red Hat JBoss Enterprise Application Platform 8.0 for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat JBoss Enterprise Application Platform 8 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 8.0.4 serves as a replacement for Red Hat JBoss Enterprise Application Platform 8.0.3, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 8.0.4 Release Notes for information about the most significant bug fixes and enhancements included in this release.
Security Fix(es):
* org.apache.cxf/cxf-rt-transports-http: unrestricted memory consumption in CXF HTTP clients [eap-8.0.z] (CVE-2024-41172)
* com.nimbusds/nimbus-jose-jwt: large JWE p2c header value causes Denial of Service [eap-8.0.z] (CVE-2023-52428)
* wildfly-domain-http: wildfly: No timeout for EAP management interface may lead to Denial of Service (DoS) [eap-8.0.z] (CVE-2024-4029)
* xalan: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) [eap-8.0.z] (CVE-2022-34169)
* org.keycloak/keycloak-services: Vulnerable Redirect URI Validation Results in Open Redirec [eap-8.0.z] (CVE-2024-8883)
* org.keycloak/keycloak-saml-core-public: Improper Verification of SAML Responses Leading to Privilege Escalation in Keycloak [eap-8.0.z] (CVE-2024-8698)
* org.keycloak/keycloak-saml-core: Improper Verification of SAML Responses Leading to Privilege Escalation in Keycloak [eap-8.0.z] (CVE-2024-8698)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "A security update is now available for Red Hat JBoss Enterprise Application Platform 8.0 for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Enterprise Application Platform 8 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 8.0.4 serves as a replacement for Red Hat JBoss Enterprise Application Platform 8.0.3, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 8.0.4 Release Notes for information about the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* org.apache.cxf/cxf-rt-transports-http: unrestricted memory consumption in CXF HTTP clients [eap-8.0.z] (CVE-2024-41172)\n\n* com.nimbusds/nimbus-jose-jwt: large JWE p2c header value causes Denial of Service [eap-8.0.z] (CVE-2023-52428)\n\n* wildfly-domain-http: wildfly: No timeout for EAP management interface may lead to Denial of Service (DoS) [eap-8.0.z] (CVE-2024-4029)\n\n* xalan: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) [eap-8.0.z] (CVE-2022-34169)\n\n* org.keycloak/keycloak-services: Vulnerable Redirect URI Validation Results in Open Redirec [eap-8.0.z] (CVE-2024-8883)\n\n* org.keycloak/keycloak-saml-core-public: Improper Verification of SAML Responses Leading to Privilege Escalation in Keycloak [eap-8.0.z] (CVE-2024-8698)\n\n* org.keycloak/keycloak-saml-core: Improper Verification of SAML Responses Leading to Privilege Escalation in Keycloak [eap-8.0.z] (CVE-2024-8698)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:8823", "url": "https://access.redhat.com/errata/RHSA-2024:8823" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/8.0/", "url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/8.0/" }, { "category": "external", "summary": "2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "2278615", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278615" }, { "category": "external", "summary": "2298829", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2298829" }, { "category": "external", "summary": "2309764", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309764" }, { "category": "external", "summary": "2311641", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2311641" }, { "category": "external", "summary": "2312511", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2312511" }, { "category": "external", "summary": "JBEAP-24945", "url": "https://issues.redhat.com/browse/JBEAP-24945" }, { "category": "external", "summary": "JBEAP-25035", "url": "https://issues.redhat.com/browse/JBEAP-25035" }, { "category": "external", "summary": "JBEAP-27002", "url": "https://issues.redhat.com/browse/JBEAP-27002" }, { "category": "external", "summary": "JBEAP-27194", "url": "https://issues.redhat.com/browse/JBEAP-27194" }, { "category": "external", "summary": "JBEAP-27247", "url": "https://issues.redhat.com/browse/JBEAP-27247" }, { "category": "external", "summary": "JBEAP-27276", "url": "https://issues.redhat.com/browse/JBEAP-27276" }, { "category": "external", "summary": "JBEAP-27293", "url": "https://issues.redhat.com/browse/JBEAP-27293" }, { "category": "external", "summary": "JBEAP-27392", "url": "https://issues.redhat.com/browse/JBEAP-27392" }, { "category": "external", "summary": "JBEAP-27543", "url": "https://issues.redhat.com/browse/JBEAP-27543" }, { "category": "external", "summary": "JBEAP-27585", "url": "https://issues.redhat.com/browse/JBEAP-27585" }, { "category": "external", "summary": "JBEAP-27643", "url": "https://issues.redhat.com/browse/JBEAP-27643" }, { "category": "external", "summary": "JBEAP-27659", "url": "https://issues.redhat.com/browse/JBEAP-27659" }, { "category": "external", "summary": "JBEAP-27688", "url": "https://issues.redhat.com/browse/JBEAP-27688" }, { "category": "external", "summary": "JBEAP-27694", "url": "https://issues.redhat.com/browse/JBEAP-27694" }, { "category": "external", "summary": "JBEAP-27957", "url": "https://issues.redhat.com/browse/JBEAP-27957" }, { "category": "external", "summary": "JBEAP-28057", "url": "https://issues.redhat.com/browse/JBEAP-28057" }, { "category": "external", "summary": "JBEAP-28278", "url": "https://issues.redhat.com/browse/JBEAP-28278" }, { "category": "external", "summary": "JBEAP-28289", "url": "https://issues.redhat.com/browse/JBEAP-28289" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8823.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.0.4 Security update", "tracking": { "current_release_date": "2024-12-13T14:17:02+00:00", "generator": { "date": "2024-12-13T14:17:02+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2024:8823", "initial_release_date": "2024-11-04T20:13:37+00:00", "revision_history": [ { "date": "2024-11-04T20:13:37+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-11-04T20:13:37+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-13T14:17:02+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss EAP 8.0 for RHEL 8", "product": { "name": "Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" }, { "branches": [ { "category": "product_version", "name": "eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.src", "product": { "name": "eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.src", "product_id": "eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-pem-keystore@2.3.0-1.redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.src", "product": { "name": "eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.src", "product_id": "eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-apache-commons-io@2.15.1-1.redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.src", "product": { "name": "eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.src", "product_id": "eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-hibernate@6.2.31-1.Final_redhat_00002.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.src", "product": { "name": "eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.src", "product_id": "eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-jboss-logging@3.5.3-1.Final_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "product": { "name": "eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "product_id": "eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-jboss-cert-helper@1.1.3-1.redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.src", "product": { "name": "eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.src", "product_id": "eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-objectweb-asm@9.6.0-1.redhat_00002.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "product": { "name": "eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "product_id": "eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-insights-java-client@1.1.3-1.redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.src", "product": { "name": "eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.src", "product_id": "eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-snakeyaml@2.2.0-1.redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "product": { "name": "eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "product_id": "eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-artemis-native@2.0.0-2.redhat_00005.1.el8eap?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.src", "product": { "name": "eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.src", "product_id": "eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-aesh-extensions@1.8.0-2.redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.src", "product": { "name": "eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.src", "product_id": "eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-nimbus-jose-jwt@9.37.3-1.redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.src", "product": { "name": "eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.src", "product_id": "eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-aesh-readline@2.2.0-2.redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.src", "product": { "name": "eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.src", "product_id": "eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-resteasy-spring@3.0.1-2.Final_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.src", "product": { "name": "eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.src", "product_id": "eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-jctools@4.0.2-1.redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.src", "product": { "name": "eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.src", "product_id": "eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-fastinfoset@2.1.0-4.redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.src", "product": { "name": "eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.src", "product_id": "eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-activemq-artemis@2.33.0-1.redhat_00015.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "product": { "name": "eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "product_id": "eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-activemq-artemis-native@2.0.0-2.redhat_00005.1.el8eap?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.src", "product": { "name": "eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.src", "product_id": "eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-apache-cxf@4.0.5-1.redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.src", "product": { "name": "eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.src", "product_id": "eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-eap-product-conf-parent@800.4.0-1.GA_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.src", "product": { "name": "eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.src", "product_id": "eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-jakarta-servlet-jsp-jstl-api@3.0.1-1.redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.src", "product": { "name": "eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.src", "product_id": "eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-narayana@6.0.3-1.Final_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.src", "product": { "name": "eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.src", "product_id": "eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-jgroups@5.3.10-1.Final_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.src", "product": { "name": "eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.src", "product_id": "eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-log4j@2.22.1-1.redhat_00002.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.src", "product": { "name": "eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.src", "product_id": "eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-slf4j@2.0.16-1.redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.src", "product": { "name": "eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.src", "product_id": "eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-apache-commons-lang@3.14.0-2.redhat_00006.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.src", "product": { "name": "eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.src", "product_id": "eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-apache-commons-codec@1.16.1-2.redhat_00007.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.src", "product": { "name": "eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.src", "product_id": "eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-saaj-impl@3.0.4-1.redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.src", "product": { "name": "eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.src", "product_id": "eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-artemis-wildfly-integration@2.0.1-1.redhat_00002.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.src", "product": { "name": "eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.src", "product_id": "eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-apache-commons-collections@3.2.2-28.redhat_2.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.src", "product": { "name": "eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.src", "product_id": "eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-asyncutil@0.1.0-2.redhat_00010.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.src", "product": { "name": "eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.src", "product_id": "eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-aws-java-sdk@1.12.284-2.redhat_00002.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.src", "product": { "name": "eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.src", "product_id": "eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-hppc@0.8.1-2.redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.src", "product": { "name": "eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.src", "product_id": "eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-resteasy-extensions@2.0.1-3.Final_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.src", "product": { "name": "eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.src", "product_id": "eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-cryptacular@1.2.5-2.redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.src", "product": { "name": "eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.src", "product_id": "eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-hibernate-validator@8.0.1-3.Final_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.src", "product": { "name": "eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.src", "product_id": "eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-shibboleth-java-support@8.0.0-6.redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.src", "product": { "name": "eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.src", "product_id": "eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-wildfly@8.0.4-2.GA_redhat_00005.1.el8eap?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.noarch", "product_id": "eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-pem-keystore@2.3.0-1.redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.noarch", "product_id": "eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-apache-commons-io@2.15.1-1.redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "product": { "name": "eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "product_id": "eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-hibernate@6.2.31-1.Final_redhat_00002.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "product": { "name": "eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "product_id": "eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-hibernate-core@6.2.31-1.Final_redhat_00002.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "product": { "name": "eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "product_id": "eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-hibernate-envers@6.2.31-1.Final_redhat_00002.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-jboss-logging@3.5.3-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "product": { "name": "eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "product_id": "eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-objectweb-asm@9.6.0-1.redhat_00002.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "product": { "name": "eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "product_id": "eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-objectweb-asm-util@9.6.0-1.redhat_00002.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "product_id": "eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-insights-java-client@1.1.3-1.redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.noarch", "product_id": "eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-snakeyaml@2.2.0-1.redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.noarch", "product_id": "eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-aesh-extensions@1.8.0-2.redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.noarch", "product_id": "eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-nimbus-jose-jwt@9.37.3-1.redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.noarch", "product_id": "eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-aesh-readline@2.2.0-2.redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-resteasy-spring@3.0.1-2.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "product_id": "eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-jctools@4.0.2-1.redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "product_id": "eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-jctools-core@4.0.2-1.redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.noarch", "product_id": "eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-fastinfoset@2.1.0-4.redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product": { "name": "eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product_id": "eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-activemq-artemis@2.33.0-1.redhat_00015.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product": { "name": "eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product_id": "eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-activemq-artemis-cli@2.33.0-1.redhat_00015.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product": { "name": "eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product_id": "eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-activemq-artemis-commons@2.33.0-1.redhat_00015.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product": { "name": "eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product_id": "eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-activemq-artemis-core-client@2.33.0-1.redhat_00015.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product": { "name": "eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product_id": "eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-activemq-artemis-dto@2.33.0-1.redhat_00015.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product": { "name": "eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product_id": "eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-activemq-artemis-hornetq-protocol@2.33.0-1.redhat_00015.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product": { "name": "eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product_id": "eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-activemq-artemis-hqclient-protocol@2.33.0-1.redhat_00015.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product": { "name": "eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product_id": "eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-activemq-artemis-jakarta-client@2.33.0-1.redhat_00015.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product": { "name": "eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product_id": "eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-activemq-artemis-jakarta-ra@2.33.0-1.redhat_00015.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product": { "name": "eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product_id": "eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-activemq-artemis-jakarta-server@2.33.0-1.redhat_00015.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product": { "name": "eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product_id": "eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-activemq-artemis-jakarta-service-extensions@2.33.0-1.redhat_00015.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product": { "name": "eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product_id": "eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-activemq-artemis-jdbc-store@2.33.0-1.redhat_00015.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product": { "name": "eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product_id": "eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-activemq-artemis-journal@2.33.0-1.redhat_00015.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product": { "name": "eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product_id": "eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-activemq-artemis-selector@2.33.0-1.redhat_00015.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product": { "name": "eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product_id": "eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-activemq-artemis-server@2.33.0-1.redhat_00015.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.noarch", "product": { "name": "eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.noarch", "product_id": "eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-activemq-artemis-native@2.0.0-2.redhat_00005.1.el8eap?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "product_id": "eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-apache-cxf@4.0.5-1.redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "product_id": "eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-apache-cxf-rt@4.0.5-1.redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "product_id": "eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-apache-cxf-services@4.0.5-1.redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "product_id": "eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-apache-cxf-tools@4.0.5-1.redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "product_id": "eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-eap-product-conf-parent@800.4.0-1.GA_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "product_id": "eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-eap-product-conf-wildfly-ee-feature-pack@800.4.0-1.GA_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "product_id": "eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-jakarta-servlet-jsp-jstl@3.0.1-1.redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "product_id": "eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-jakarta-servlet-jsp-jstl-api@3.0.1-1.redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-narayana@6.0.3-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-narayana-jbosstxbridge@6.0.3-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-narayana-jbossxts@6.0.3-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-narayana-jts-idlj@6.0.3-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-narayana-jts-integration@6.0.3-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-narayana-restat-api@6.0.3-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-narayana-restat-bridge@6.0.3-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-narayana-restat-integration@6.0.3-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-narayana-restat-util@6.0.3-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-jgroups@5.3.10-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.noarch", "product": { "name": "eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.noarch", "product_id": "eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-log4j@2.22.1-1.redhat_00002.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "product_id": "eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-slf4j@2.0.16-1.redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "product_id": "eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-slf4j-api@2.0.16-1.redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.noarch", "product": { "name": "eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.noarch", "product_id": "eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-apache-commons-lang@3.14.0-2.redhat_00006.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.noarch", "product": { "name": "eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.noarch", "product_id": "eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-apache-commons-codec@1.16.1-2.redhat_00007.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.noarch", "product_id": "eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-saaj-impl@3.0.4-1.redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.noarch", "product": { "name": "eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.noarch", "product_id": "eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-artemis-wildfly-integration@2.0.1-1.redhat_00002.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.noarch", "product": { "name": "eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.noarch", "product_id": "eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-apache-commons-collections@3.2.2-28.redhat_2.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.noarch", "product": { "name": "eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.noarch", "product_id": "eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-asyncutil@0.1.0-2.redhat_00010.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "product": { "name": "eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "product_id": "eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-aws-java-sdk@1.12.284-2.redhat_00002.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "product": { "name": "eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "product_id": "eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-aws-java-sdk-core@1.12.284-2.redhat_00002.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "product": { "name": "eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "product_id": "eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-aws-java-sdk-kms@1.12.284-2.redhat_00002.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "product": { "name": "eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "product_id": "eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-aws-java-sdk-s3@1.12.284-2.redhat_00002.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "product": { "name": "eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "product_id": "eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-jmespath-java@1.12.284-2.redhat_00002.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.noarch", "product_id": "eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-hppc@0.8.1-2.redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-resteasy-extensions@2.0.1-3.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-resteasy-tracing-api@2.0.1-3.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.noarch", "product_id": "eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-cryptacular@1.2.5-2.redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-hibernate-validator@8.0.1-3.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-hibernate-validator-cdi@8.0.1-3.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.noarch", "product": { "name": "eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.noarch", "product_id": "eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-shibboleth-java-support@8.0.0-6.redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "product": { "name": "eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "product_id": "eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-wildfly@8.0.4-2.GA_redhat_00005.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "product": { "name": "eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "product_id": "eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-wildfly-java-jdk11@8.0.4-2.GA_redhat_00005.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "product": { "name": "eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "product_id": "eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-wildfly-java-jdk17@8.0.4-2.GA_redhat_00005.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "product": { "name": "eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "product_id": "eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-wildfly-java-jdk21@8.0.4-2.GA_redhat_00005.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "product": { "name": "eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "product_id": "eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-wildfly-modules@8.0.4-2.GA_redhat_00005.1.el8eap?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "product": { "name": "eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "product_id": "eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-jboss-cert-helper@1.1.3-1.redhat_00001.1.el8eap?arch=x86_64" } } }, { "category": "product_version", "name": "eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "product": { "name": "eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "product_id": "eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-artemis-native@2.0.0-2.redhat_00005.1.el8eap?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "product": { "name": "eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "product_id": "eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-artemis-native-wildfly@2.0.0-2.redhat_00005.1.el8eap?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.noarch" }, "product_reference": "eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.src" }, "product_reference": "eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el8eap.noarch" }, "product_reference": "eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el8eap.noarch" }, "product_reference": "eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch" }, "product_reference": "eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el8eap.noarch" }, "product_reference": "eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch" }, "product_reference": "eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch" }, "product_reference": "eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch" }, "product_reference": "eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el8eap.noarch" }, "product_reference": "eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch" }, "product_reference": "eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el8eap.noarch" }, "product_reference": "eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el8eap.noarch" }, "product_reference": "eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el8eap.noarch" }, "product_reference": "eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.noarch" }, "product_reference": "eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src" }, "product_reference": "eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el8eap.noarch" }, "product_reference": "eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch" }, "product_reference": "eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.src" }, "product_reference": "eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.src" }, "product_reference": "eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.noarch" }, "product_reference": "eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.src" }, "product_reference": "eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.noarch" }, "product_reference": "eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.src" }, "product_reference": "eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.src" }, "product_reference": "eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.noarch" }, "product_reference": "eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.src" }, "product_reference": "eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.src" }, "product_reference": "eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src" }, "product_reference": "eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.x86_64 as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.x86_64" }, "product_reference": "eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el8eap.x86_64 as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el8eap.x86_64" }, "product_reference": "eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.noarch" }, "product_reference": "eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.src" }, "product_reference": "eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.noarch" }, "product_reference": "eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.src" }, "product_reference": "eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.noarch" }, "product_reference": "eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.src" }, "product_reference": "eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el8eap.noarch" }, "product_reference": "eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el8eap.noarch" }, "product_reference": "eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el8eap.noarch" }, "product_reference": "eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.src" }, "product_reference": "eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.src" }, "product_reference": "eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.src" }, "product_reference": "eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch" }, "product_reference": "eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.src" }, "product_reference": "eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch" }, "product_reference": "eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch" }, "product_reference": "eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.src" }, "product_reference": "eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.src" }, "product_reference": "eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src" }, "product_reference": "eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.src" }, "product_reference": "eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src" }, "product_reference": "eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64 as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64" }, "product_reference": "eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.src" }, "product_reference": "eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.src" }, "product_reference": "eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.src" }, "product_reference": "eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el8eap.noarch" }, "product_reference": "eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.noarch" }, "product_reference": "eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.src" }, "product_reference": "eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.src" }, "product_reference": "eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.src" }, "product_reference": "eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.noarch" }, "product_reference": "eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.src" }, "product_reference": "eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el8eap.noarch" }, "product_reference": "eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.src" }, "product_reference": "eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.src" }, "product_reference": "eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.src" }, "product_reference": "eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.src" }, "product_reference": "eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.src" }, "product_reference": "eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.src" }, "product_reference": "eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.noarch" }, "product_reference": "eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.src" }, "product_reference": "eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch" }, "product_reference": "eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.src" }, "product_reference": "eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch" }, "product_reference": "eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch" }, "product_reference": "eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch" }, "product_reference": "eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 8", "product_id": "8Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch" }, "product_reference": "eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-8.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108554" } ], "notes": [ { "category": "description", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "RHBZ#2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-34169", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-04T20:13:37+00:00", "details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8823" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)" }, { "cve": "CVE-2023-52428", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2024-09-04T17:02:58.468000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2309764" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the Nimbus Jose JWT package. This issue could allow an attacker to use a malicious large JWE p2c header value for PasswordBasedDecrypter and cause a Denial of Service (DoS).", "title": "Vulnerability description" }, { "category": "summary", "text": "nimbus-jose-jwt: large JWE p2c header value causes Denial of Service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-52428" }, { "category": "external", "summary": "RHBZ#2309764", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309764" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-52428", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52428" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-52428", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52428" } ], "release_date": "2024-02-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-04T20:13:37+00:00", "details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8823" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "nimbus-jose-jwt: large JWE p2c header value causes Denial of Service" }, { "cve": "CVE-2024-4029", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2024-04-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2278615" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Wildfly\u2019s management interface. Due to the lack of limitation of sockets for the management interface, it may be possible to cause a denial of service hitting the nofile limit as there is no possibility to configure or set a maximum number of connections.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly: No timeout for EAP management interface may lead to Denial of Service (DoS)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat rates this as a Low impact since this requires high privileges to jeopardize the system. The management interface is normally internal/local only and not exposed externally.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-4029" }, { "category": "external", "summary": "RHBZ#2278615", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278615" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-4029", "url": "https://www.cve.org/CVERecord?id=CVE-2024-4029" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-4029", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4029" } ], "release_date": "2024-05-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-04T20:13:37+00:00", "details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8823" }, { "category": "workaround", "details": "Currently there is no available mitigation for this vulnerability. Please make sure to perform updates as they become available.", "product_ids": [ "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "wildfly: No timeout for EAP management interface may lead to Denial of Service (DoS)" }, { "acknowledgments": [ { "names": [ "Tanner Emek" ] } ], "cve": "CVE-2024-8698", "cwe": { "id": "CWE-347", "name": "Improper Verification of Cryptographic Signature" }, "discovery_date": "2024-09-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2311641" } ], "notes": [ { "category": "description", "text": "A flaw exists in the SAML signature validation method within the Keycloak XMLSignatureUtil class. The method incorrectly determines whether a SAML signature is for the full document or only for specific assertions based on the position of the signature in the XML document, rather than the Reference element used to specify the signed element. This flaw allows attackers to create crafted responses that can bypass the validation, potentially leading to privilege escalation or impersonation attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak-saml-core: Improper Verification of SAML Responses Leading to Privilege Escalation in Keycloak", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is of high severity due to its potential to facilitate privilege escalation and user impersonation in systems using SAML for authentication. The core issue stems from improper validation logic in Keycloak\u0027s signature validation method, which relies on the position of signatures rather than explicitly checking the referenced elements. By manipulating the XML structure, an attacker can bypass signature validation and inject an unsigned assertion while retaining a valid signed one. This allows unauthorized access to high-privileged accounts, leading to significant security risks in SAML-based identity providers and service providers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-8698" }, { "category": "external", "summary": "RHBZ#2311641", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2311641" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-8698", "url": "https://www.cve.org/CVERecord?id=CVE-2024-8698" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-8698", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-8698" } ], "release_date": "2024-09-19T15:12:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-04T20:13:37+00:00", "details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8823" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:L", "version": "3.1" }, "products": [ "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "keycloak-saml-core: Improper Verification of SAML Responses Leading to Privilege Escalation in Keycloak" }, { "acknowledgments": [ { "names": [ "Niklas Conrad", "Karsten Meyer zu Selhausen" ] } ], "cve": "CVE-2024-8883", "cwe": { "id": "CWE-601", "name": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)" }, "discovery_date": "2024-09-16T06:17:01.573000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2312511" } ], "notes": [ { "category": "description", "text": "A misconfiguration flaw was found in Keycloak. This issue can allow an attacker to redirect users to an arbitrary URL if a \u0027Valid Redirect URI\u0027 is set to http://localhost or http://127.0.0.1, enabling sensitive information such as authorization codes to be exposed to the attacker, potentially leading to session hijacking.", "title": "Vulnerability description" }, { "category": "summary", "text": "Keycloak: Vulnerable Redirect URI Validation Results in Open Redirec", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-8883" }, { "category": "external", "summary": "RHBZ#2312511", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2312511" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-8883", "url": "https://www.cve.org/CVERecord?id=CVE-2024-8883" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-8883", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-8883" }, { "category": "external", "summary": "https://github.com/keycloak/keycloak/blob/main/services/src/main/java/org/keycloak/protocol/oidc/utils/RedirectUtils.java", "url": "https://github.com/keycloak/keycloak/blob/main/services/src/main/java/org/keycloak/protocol/oidc/utils/RedirectUtils.java" } ], "release_date": "2024-09-19T15:13:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-04T20:13:37+00:00", "details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8823" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Keycloak: Vulnerable Redirect URI Validation Results in Open Redirec" }, { "cve": "CVE-2024-41172", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "discovery_date": "2024-07-19T09:20:34+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2298829" } ], "notes": [ { "category": "description", "text": "A memory consumption flaw was found in Apache CXF. This issue may allow a CXF HTTP client conduit to prevent HTTPClient instances from being garbage collected, eventually causing the application to run out of memory.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache: cxf: org.apache.cxf:cxf-rt-transports-http: unrestricted memory consumption in CXF HTTP clients", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-41172" }, { "category": "external", "summary": "RHBZ#2298829", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2298829" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-41172", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41172" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41172", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41172" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-4mgg-fqfq-64hg", "url": "https://github.com/advisories/GHSA-4mgg-fqfq-64hg" }, { "category": "external", "summary": "https://lists.apache.org/thread/n2hvbrgwpdtcqdccod8by28ynnolybl6", "url": "https://lists.apache.org/thread/n2hvbrgwpdtcqdccod8by28ynnolybl6" }, { "category": "external", "summary": "https://osv.dev/vulnerability/GHSA-4mgg-fqfq-64hg", "url": "https://osv.dev/vulnerability/GHSA-4mgg-fqfq-64hg" } ], "release_date": "2024-07-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-04T20:13:37+00:00", "details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8823" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el8eap.src", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch", "8Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el8eap.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "apache: cxf: org.apache.cxf:cxf-rt-transports-http: unrestricted memory consumption in CXF HTTP clients" } ] }
rhsa-2022_5695
Vulnerability from csaf_redhat
Published
2022-07-25 14:56
Modified
2024-11-26 03:08
Summary
Red Hat Security Advisory: java-11-openjdk security, bug fix, and enhancement update
Notes
Topic
An update for java-11-openjdk is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.
The following packages have been upgraded to a later upstream version: java-11-openjdk (11.0.16.0.8). (BZ#2084777)
Security Fix(es):
* OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) (CVE-2022-34169)
* OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540)
* OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* rh1991003 patch breaks sun.security.pkcs11.wrapper.PKCS11.getInstance() [rhel-9, openjdk-11] (BZ#2099915)
* SecretKey generate/import operations don't add the CKA_SIGN attribute in FIPS mode [rhel-9, openjdk-11] (BZ#2107866)
* Revert to disabling system security properties and FIPS mode support together [rhel-9, openjdk-11] (BZ#2107868)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for java-11-openjdk is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.\n\nThe following packages have been upgraded to a later upstream version: java-11-openjdk (11.0.16.0.8). (BZ#2084777)\n\nSecurity Fix(es):\n\n* OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) (CVE-2022-34169)\n\n* OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540)\n\n* OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* rh1991003 patch breaks sun.security.pkcs11.wrapper.PKCS11.getInstance() [rhel-9, openjdk-11] (BZ#2099915)\n\n* SecretKey generate/import operations don\u0027t add the CKA_SIGN attribute in FIPS mode [rhel-9, openjdk-11] (BZ#2107866)\n\n* Revert to disabling system security properties and FIPS mode support together [rhel-9, openjdk-11] (BZ#2107868)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:5695", "url": "https://access.redhat.com/errata/RHSA-2022:5695" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2084777", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084777" }, { "category": "external", "summary": "2099915", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099915" }, { "category": "external", "summary": "2107866", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107866" }, { "category": "external", "summary": "2107868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107868" }, { "category": "external", "summary": "2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5695.json" } ], "title": "Red Hat Security Advisory: java-11-openjdk security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-11-26T03:08:11+00:00", "generator": { "date": "2024-11-26T03:08:11+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2022:5695", "initial_release_date": "2022-07-25T14:56:24+00:00", "revision_history": [ { "date": "2022-07-25T14:56:24+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-07-25T14:56:24+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-26T03:08:11+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream" } } }, { "category": "product_name", "name": "Red Hat CodeReady Linux Builder (v. 9)", "product": { "name": "Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::crb" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product": { "name": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product_id": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo-fastdebug@11.0.16.0.8-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product": { "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product_id": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo-slowdebug@11.0.16.0.8-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product": { "name": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product_id": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-fastdebug@11.0.16.0.8-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product": { "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product_id": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-slowdebug@11.0.16.0.8-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product": { "name": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product_id": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-fastdebug@11.0.16.0.8-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product": { "name": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product_id": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-fastdebug@11.0.16.0.8-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product": { "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product_id": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-slowdebug@11.0.16.0.8-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product": { "name": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product_id": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods-fastdebug@11.0.16.0.8-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product": { "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product_id": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods-slowdebug@11.0.16.0.8-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product": { "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product_id": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-slowdebug@11.0.16.0.8-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product": { "name": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product_id": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src-fastdebug@11.0.16.0.8-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product": { "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product_id": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src-slowdebug@11.0.16.0.8-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product": { "name": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product_id": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs-fastdebug@11.0.16.0.8-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product": { "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product_id": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs-slowdebug@11.0.16.0.8-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.aarch64", "product": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.aarch64", "product_id": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debugsource@11.0.16.0.8-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "product": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "product_id": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debuginfo@11.0.16.0.8-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "product": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "product_id": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-debuginfo@11.0.16.0.8-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "product": { "name": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "product_id": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-fastdebug-debuginfo@11.0.16.0.8-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "product": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "product_id": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-slowdebug-debuginfo@11.0.16.0.8-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "product": { "name": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "product_id": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-fastdebug-debuginfo@11.0.16.0.8-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "product": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "product_id": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-debuginfo@11.0.16.0.8-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "product": { "name": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "product_id": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-fastdebug-debuginfo@11.0.16.0.8-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "product": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "product_id": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-slowdebug-debuginfo@11.0.16.0.8-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "product": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "product_id": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-slowdebug-debuginfo@11.0.16.0.8-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-1:11.0.16.0.8-1.el9_0.aarch64", "product": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el9_0.aarch64", "product_id": "java-11-openjdk-1:11.0.16.0.8-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.16.0.8-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.aarch64", "product": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.aarch64", "product_id": "java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo@11.0.16.0.8-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.aarch64", "product": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.aarch64", "product_id": "java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel@11.0.16.0.8-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.aarch64", "product": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.aarch64", "product_id": "java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless@11.0.16.0.8-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.aarch64", "product": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.aarch64", "product_id": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc@11.0.16.0.8-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.aarch64", "product": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.aarch64", "product_id": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc-zip@11.0.16.0.8-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.aarch64", "product": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.aarch64", "product_id": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods@11.0.16.0.8-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.aarch64", "product": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.aarch64", "product_id": "java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src@11.0.16.0.8-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.aarch64", "product": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.aarch64", "product_id": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs@11.0.16.0.8-1.el9_0?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product": { "name": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product_id": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo-fastdebug@11.0.16.0.8-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product": { "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product_id": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo-slowdebug@11.0.16.0.8-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product": { "name": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product_id": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-fastdebug@11.0.16.0.8-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product": { "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product_id": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-slowdebug@11.0.16.0.8-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product": { "name": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product_id": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-fastdebug@11.0.16.0.8-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product": { "name": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product_id": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-fastdebug@11.0.16.0.8-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product": { "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product_id": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-slowdebug@11.0.16.0.8-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product": { "name": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product_id": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods-fastdebug@11.0.16.0.8-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product": { "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product_id": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods-slowdebug@11.0.16.0.8-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product": { "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product_id": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-slowdebug@11.0.16.0.8-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product": { "name": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product_id": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src-fastdebug@11.0.16.0.8-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product": { "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product_id": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src-slowdebug@11.0.16.0.8-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product": { "name": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product_id": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs-fastdebug@11.0.16.0.8-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product": { "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product_id": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs-slowdebug@11.0.16.0.8-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.ppc64le", "product": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.ppc64le", "product_id": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debugsource@11.0.16.0.8-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "product": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "product_id": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debuginfo@11.0.16.0.8-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "product": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "product_id": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-debuginfo@11.0.16.0.8-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "product": { "name": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "product_id": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-fastdebug-debuginfo@11.0.16.0.8-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "product": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "product_id": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-slowdebug-debuginfo@11.0.16.0.8-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "product": { "name": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "product_id": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-fastdebug-debuginfo@11.0.16.0.8-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "product": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "product_id": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-debuginfo@11.0.16.0.8-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "product": { "name": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "product_id": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-fastdebug-debuginfo@11.0.16.0.8-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "product": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "product_id": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-slowdebug-debuginfo@11.0.16.0.8-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "product": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "product_id": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-slowdebug-debuginfo@11.0.16.0.8-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-1:11.0.16.0.8-1.el9_0.ppc64le", "product": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el9_0.ppc64le", "product_id": "java-11-openjdk-1:11.0.16.0.8-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.16.0.8-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.ppc64le", "product": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.ppc64le", "product_id": "java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo@11.0.16.0.8-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.ppc64le", "product": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.ppc64le", "product_id": "java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel@11.0.16.0.8-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.ppc64le", "product": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.ppc64le", "product_id": "java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless@11.0.16.0.8-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.ppc64le", "product": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.ppc64le", "product_id": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc@11.0.16.0.8-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.ppc64le", "product": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.ppc64le", "product_id": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc-zip@11.0.16.0.8-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.ppc64le", "product": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.ppc64le", "product_id": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods@11.0.16.0.8-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.ppc64le", "product": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.ppc64le", "product_id": "java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src@11.0.16.0.8-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.ppc64le", "product": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.ppc64le", "product_id": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs@11.0.16.0.8-1.el9_0?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product": { "name": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product_id": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo-fastdebug@11.0.16.0.8-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product": { "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product_id": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo-slowdebug@11.0.16.0.8-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product": { "name": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product_id": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-fastdebug@11.0.16.0.8-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product": { "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product_id": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-slowdebug@11.0.16.0.8-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product": { "name": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product_id": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-fastdebug@11.0.16.0.8-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product": { "name": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product_id": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-fastdebug@11.0.16.0.8-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product": { "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product_id": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-slowdebug@11.0.16.0.8-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product": { "name": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product_id": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods-fastdebug@11.0.16.0.8-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product": { "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product_id": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods-slowdebug@11.0.16.0.8-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product": { "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product_id": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-slowdebug@11.0.16.0.8-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product": { "name": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product_id": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src-fastdebug@11.0.16.0.8-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product": { "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product_id": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src-slowdebug@11.0.16.0.8-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product": { "name": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product_id": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs-fastdebug@11.0.16.0.8-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product": { "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product_id": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs-slowdebug@11.0.16.0.8-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.x86_64", "product": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.x86_64", "product_id": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debugsource@11.0.16.0.8-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "product": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "product_id": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debuginfo@11.0.16.0.8-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "product": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "product_id": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-debuginfo@11.0.16.0.8-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "product": { "name": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "product_id": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-fastdebug-debuginfo@11.0.16.0.8-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "product": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "product_id": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-slowdebug-debuginfo@11.0.16.0.8-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "product": { "name": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "product_id": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-fastdebug-debuginfo@11.0.16.0.8-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "product": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "product_id": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-debuginfo@11.0.16.0.8-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "product": { "name": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "product_id": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-fastdebug-debuginfo@11.0.16.0.8-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "product": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "product_id": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-slowdebug-debuginfo@11.0.16.0.8-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "product": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "product_id": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-slowdebug-debuginfo@11.0.16.0.8-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-1:11.0.16.0.8-1.el9_0.x86_64", "product": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el9_0.x86_64", "product_id": "java-11-openjdk-1:11.0.16.0.8-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.16.0.8-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.x86_64", "product": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.x86_64", "product_id": "java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo@11.0.16.0.8-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.x86_64", "product": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.x86_64", "product_id": "java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel@11.0.16.0.8-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.x86_64", "product": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.x86_64", "product_id": "java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless@11.0.16.0.8-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.x86_64", "product": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.x86_64", "product_id": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc@11.0.16.0.8-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.x86_64", "product": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.x86_64", "product_id": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc-zip@11.0.16.0.8-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.x86_64", "product": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.x86_64", "product_id": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods@11.0.16.0.8-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.x86_64", "product": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.x86_64", "product_id": "java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src@11.0.16.0.8-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.x86_64", "product": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.x86_64", "product_id": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs@11.0.16.0.8-1.el9_0?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "product": { "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "product_id": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo-slowdebug@11.0.16.0.8-1.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "product": { "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "product_id": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-slowdebug@11.0.16.0.8-1.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "product": { "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "product_id": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-slowdebug@11.0.16.0.8-1.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "product": { "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "product_id": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods-slowdebug@11.0.16.0.8-1.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "product": { "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "product_id": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-slowdebug@11.0.16.0.8-1.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "product": { "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "product_id": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src-slowdebug@11.0.16.0.8-1.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "product": { "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "product_id": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs-slowdebug@11.0.16.0.8-1.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.s390x", "product": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.s390x", "product_id": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debugsource@11.0.16.0.8-1.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "product": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "product_id": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debuginfo@11.0.16.0.8-1.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "product": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "product_id": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-debuginfo@11.0.16.0.8-1.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "product": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "product_id": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-slowdebug-debuginfo@11.0.16.0.8-1.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "product": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "product_id": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-debuginfo@11.0.16.0.8-1.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "product": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "product_id": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-slowdebug-debuginfo@11.0.16.0.8-1.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "product": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "product_id": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-slowdebug-debuginfo@11.0.16.0.8-1.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-1:11.0.16.0.8-1.el9_0.s390x", "product": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el9_0.s390x", "product_id": "java-11-openjdk-1:11.0.16.0.8-1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.16.0.8-1.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.s390x", "product": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.s390x", "product_id": "java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo@11.0.16.0.8-1.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.s390x", "product": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.s390x", "product_id": "java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel@11.0.16.0.8-1.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.s390x", "product": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.s390x", "product_id": "java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless@11.0.16.0.8-1.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.s390x", "product": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.s390x", "product_id": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc@11.0.16.0.8-1.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.s390x", "product": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.s390x", "product_id": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc-zip@11.0.16.0.8-1.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.s390x", "product": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.s390x", "product_id": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods@11.0.16.0.8-1.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.s390x", "product": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.s390x", "product_id": "java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src@11.0.16.0.8-1.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.s390x", "product": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.s390x", "product_id": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs@11.0.16.0.8-1.el9_0?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-1:11.0.16.0.8-1.el9_0.src", "product": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el9_0.src", "product_id": "java-11-openjdk-1:11.0.16.0.8-1.el9_0.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.16.0.8-1.el9_0?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el9_0.src as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.src" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el9_0.src", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el9_0.src as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.src" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el9_0.src", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64" }, "product_reference": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le" }, "product_reference": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.s390x" }, "product_reference": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64" }, "product_reference": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21540", "cwe": { "id": "CWE-402", "name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108540" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: class compilation issue (Hotspot, 8281859)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21540" }, { "category": "external", "summary": "RHBZ#2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21540", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21540" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-25T14:56:24+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5695" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: class compilation issue (Hotspot, 8281859)" }, { "cve": "CVE-2022-21541", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108543" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21541" }, { "category": "external", "summary": "RHBZ#2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21541", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21541" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-25T14:56:24+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5695" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)" }, { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108554" } ], "notes": [ { "category": "description", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "RHBZ#2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-34169", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-25T14:56:24+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5695" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)" } ] }
rhsa-2022_5696
Vulnerability from csaf_redhat
Published
2022-07-25 18:49
Modified
2024-11-26 03:08
Summary
Red Hat Security Advisory: java-1.8.0-openjdk security, bug fix, and enhancement update
Notes
Topic
An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.
The following packages have been upgraded to a later upstream version: java-1.8.0-openjdk (1.8.0.342.b07). (BZ#2084648)
Security Fix(es):
* OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) (CVE-2022-34169)
* OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540)
* OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* rh1991003 patch breaks sun.security.pkcs11.wrapper.PKCS11.getInstance() [rhel-8, openjdk-8] (BZ#2099911)
* Revert to disabling system security properties and FIPS mode support together [rhel-8, openjdk-8] (BZ#2108564)
* SecretKey generate/import operations don't add the CKA_SIGN attribute in FIPS mode [rhel-8, openjdk-8] (BZ#2108566)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.\n\nThe following packages have been upgraded to a later upstream version: java-1.8.0-openjdk (1.8.0.342.b07). (BZ#2084648)\n\nSecurity Fix(es):\n\n* OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) (CVE-2022-34169)\n\n* OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540)\n\n* OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* rh1991003 patch breaks sun.security.pkcs11.wrapper.PKCS11.getInstance() [rhel-8, openjdk-8] (BZ#2099911)\n\n* Revert to disabling system security properties and FIPS mode support together [rhel-8, openjdk-8] (BZ#2108564)\n\n* SecretKey generate/import operations don\u0027t add the CKA_SIGN attribute in FIPS mode [rhel-8, openjdk-8] (BZ#2108566)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:5696", "url": "https://access.redhat.com/errata/RHSA-2022:5696" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2084648", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084648" }, { "category": "external", "summary": "2099911", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099911" }, { "category": "external", "summary": "2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "2108564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108564" }, { "category": "external", "summary": "2108566", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108566" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5696.json" } ], "title": "Red Hat Security Advisory: java-1.8.0-openjdk security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-11-26T03:08:34+00:00", "generator": { "date": "2024-11-26T03:08:34+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2022:5696", "initial_release_date": "2022-07-25T18:49:13+00:00", "revision_history": [ { "date": "2022-07-25T18:49:13+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-07-25T18:49:13+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-26T03:08:34+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux CRB (v. 8)", "product": { "name": "Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::crb" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.src", "product": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.src", "product_id": "java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk@1.8.0.342.b07-2.el8_6?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.aarch64", "product": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.aarch64", "product_id": "java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk@1.8.0.342.b07-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.aarch64", "product": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.aarch64", "product_id": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility@1.8.0.342.b07-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.aarch64", "product": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.aarch64", "product_id": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo@1.8.0.342.b07-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.aarch64", "product": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.aarch64", "product_id": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel@1.8.0.342.b07-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.aarch64", "product": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.aarch64", "product_id": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless@1.8.0.342.b07-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.aarch64", "product": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.aarch64", "product_id": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src@1.8.0.342.b07-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.aarch64", "product": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.aarch64", "product_id": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debugsource@1.8.0.342.b07-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "product": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "product_id": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debuginfo@1.8.0.342.b07-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "product": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "product_id": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-debuginfo@1.8.0.342.b07-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "product": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "product_id": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-debuginfo@1.8.0.342.b07-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "product": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "product_id": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-debuginfo@1.8.0.342.b07-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "product": { "name": "java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "product_id": "java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility-fastdebug@1.8.0.342.b07-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "product": { "name": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "product_id": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility-slowdebug@1.8.0.342.b07-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "product": { "name": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "product_id": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-fastdebug@1.8.0.342.b07-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "product": { "name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "product_id": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-slowdebug@1.8.0.342.b07-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "product": { "name": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "product_id": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-fastdebug@1.8.0.342.b07-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "product": { "name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "product_id": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-slowdebug@1.8.0.342.b07-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "product": { "name": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "product_id": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-fastdebug@1.8.0.342.b07-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "product": { "name": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "product_id": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-fastdebug@1.8.0.342.b07-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "product": { "name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "product_id": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-slowdebug@1.8.0.342.b07-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "product": { "name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "product_id": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-slowdebug@1.8.0.342.b07-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "product": { "name": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "product_id": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src-fastdebug@1.8.0.342.b07-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "product": { "name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "product_id": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src-slowdebug@1.8.0.342.b07-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "product": { "name": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "product_id": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-fastdebug-debuginfo@1.8.0.342.b07-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "product": { "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "product_id": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-slowdebug-debuginfo@1.8.0.342.b07-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "product": { "name": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "product_id": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-fastdebug-debuginfo@1.8.0.342.b07-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "product": { "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "product_id": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-slowdebug-debuginfo@1.8.0.342.b07-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "product": { "name": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "product_id": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-fastdebug-debuginfo@1.8.0.342.b07-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "product": { "name": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "product_id": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-fastdebug-debuginfo@1.8.0.342.b07-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "product": { "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "product_id": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-slowdebug-debuginfo@1.8.0.342.b07-2.el8_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "product": { "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "product_id": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-slowdebug-debuginfo@1.8.0.342.b07-2.el8_6?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.ppc64le", "product": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_id": "java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk@1.8.0.342.b07-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.ppc64le", "product": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_id": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility@1.8.0.342.b07-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.ppc64le", "product": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_id": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo@1.8.0.342.b07-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.ppc64le", "product": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_id": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel@1.8.0.342.b07-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.ppc64le", "product": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_id": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless@1.8.0.342.b07-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.ppc64le", "product": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_id": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src@1.8.0.342.b07-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.ppc64le", "product": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_id": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debugsource@1.8.0.342.b07-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "product": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_id": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debuginfo@1.8.0.342.b07-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "product": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_id": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-debuginfo@1.8.0.342.b07-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "product": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_id": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-debuginfo@1.8.0.342.b07-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "product": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_id": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-debuginfo@1.8.0.342.b07-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "product": { "name": "java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_id": "java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility-fastdebug@1.8.0.342.b07-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "product": { "name": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_id": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility-slowdebug@1.8.0.342.b07-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "product": { "name": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_id": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-fastdebug@1.8.0.342.b07-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "product": { "name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_id": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-slowdebug@1.8.0.342.b07-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "product": { "name": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_id": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-fastdebug@1.8.0.342.b07-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "product": { "name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_id": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-slowdebug@1.8.0.342.b07-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "product": { "name": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_id": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-fastdebug@1.8.0.342.b07-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "product": { "name": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_id": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-fastdebug@1.8.0.342.b07-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "product": { "name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_id": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-slowdebug@1.8.0.342.b07-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "product": { "name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_id": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-slowdebug@1.8.0.342.b07-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "product": { "name": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_id": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src-fastdebug@1.8.0.342.b07-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "product": { "name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_id": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src-slowdebug@1.8.0.342.b07-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "product": { "name": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_id": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-fastdebug-debuginfo@1.8.0.342.b07-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "product": { "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_id": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-slowdebug-debuginfo@1.8.0.342.b07-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "product": { "name": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_id": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-fastdebug-debuginfo@1.8.0.342.b07-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "product": { "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_id": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-slowdebug-debuginfo@1.8.0.342.b07-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "product": { "name": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_id": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-fastdebug-debuginfo@1.8.0.342.b07-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "product": { "name": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_id": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-fastdebug-debuginfo@1.8.0.342.b07-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "product": { "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_id": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-slowdebug-debuginfo@1.8.0.342.b07-2.el8_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "product": { "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_id": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-slowdebug-debuginfo@1.8.0.342.b07-2.el8_6?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.x86_64", "product": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.x86_64", "product_id": "java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk@1.8.0.342.b07-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.x86_64", "product": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.x86_64", "product_id": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility@1.8.0.342.b07-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.x86_64", "product": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.x86_64", "product_id": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo@1.8.0.342.b07-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.x86_64", "product": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.x86_64", "product_id": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel@1.8.0.342.b07-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.x86_64", "product": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.x86_64", "product_id": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless@1.8.0.342.b07-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.x86_64", "product": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.x86_64", "product_id": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src@1.8.0.342.b07-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.x86_64", "product": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.x86_64", "product_id": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debugsource@1.8.0.342.b07-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "product": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "product_id": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debuginfo@1.8.0.342.b07-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "product": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "product_id": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-debuginfo@1.8.0.342.b07-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "product": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "product_id": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-debuginfo@1.8.0.342.b07-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "product": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "product_id": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-debuginfo@1.8.0.342.b07-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "product": { "name": "java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "product_id": "java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility-fastdebug@1.8.0.342.b07-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "product": { "name": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "product_id": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility-slowdebug@1.8.0.342.b07-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "product": { "name": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "product_id": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-fastdebug@1.8.0.342.b07-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "product": { "name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "product_id": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-slowdebug@1.8.0.342.b07-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "product": { "name": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "product_id": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-fastdebug@1.8.0.342.b07-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "product": { "name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "product_id": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-slowdebug@1.8.0.342.b07-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "product": { "name": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "product_id": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-fastdebug@1.8.0.342.b07-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "product": { "name": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "product_id": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-fastdebug@1.8.0.342.b07-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "product": { "name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "product_id": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-slowdebug@1.8.0.342.b07-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "product": { "name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "product_id": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-slowdebug@1.8.0.342.b07-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "product": { "name": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "product_id": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src-fastdebug@1.8.0.342.b07-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "product": { "name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "product_id": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src-slowdebug@1.8.0.342.b07-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "product": { "name": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "product_id": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-fastdebug-debuginfo@1.8.0.342.b07-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "product": { "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "product_id": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-slowdebug-debuginfo@1.8.0.342.b07-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "product": { "name": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "product_id": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-fastdebug-debuginfo@1.8.0.342.b07-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "product": { "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "product_id": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-slowdebug-debuginfo@1.8.0.342.b07-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "product": { "name": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "product_id": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-fastdebug-debuginfo@1.8.0.342.b07-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "product": { "name": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "product_id": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-fastdebug-debuginfo@1.8.0.342.b07-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "product": { "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "product_id": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-slowdebug-debuginfo@1.8.0.342.b07-2.el8_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "product": { "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "product_id": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-slowdebug-debuginfo@1.8.0.342.b07-2.el8_6?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.s390x", "product": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.s390x", "product_id": "java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk@1.8.0.342.b07-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.s390x", "product": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.s390x", "product_id": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility@1.8.0.342.b07-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.s390x", "product": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.s390x", "product_id": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo@1.8.0.342.b07-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.s390x", "product": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.s390x", "product_id": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel@1.8.0.342.b07-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.s390x", "product": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.s390x", "product_id": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless@1.8.0.342.b07-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.s390x", "product": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.s390x", "product_id": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src@1.8.0.342.b07-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.s390x", "product": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.s390x", "product_id": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debugsource@1.8.0.342.b07-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "product": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "product_id": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debuginfo@1.8.0.342.b07-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "product": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "product_id": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-debuginfo@1.8.0.342.b07-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "product": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "product_id": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-debuginfo@1.8.0.342.b07-2.el8_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "product": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "product_id": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-debuginfo@1.8.0.342.b07-2.el8_6?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-2.el8_6.noarch", "product": { "name": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-2.el8_6.noarch", "product_id": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-2.el8_6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-javadoc@1.8.0.342.b07-2.el8_6?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-2.el8_6.noarch", "product": { "name": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-2.el8_6.noarch", "product_id": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-2.el8_6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-javadoc-zip@1.8.0.342.b07-2.el8_6?arch=noarch\u0026epoch=1" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.s390x" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.src as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.src" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.src", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.s390x" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.s390x" }, "product_reference": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.s390x" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x" }, "product_reference": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.s390x" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x" }, "product_reference": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.s390x" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x" }, "product_reference": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-2.el8_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-2.el8_6.noarch" }, "product_reference": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-2.el8_6.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-2.el8_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-2.el8_6.noarch" }, "product_reference": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-2.el8_6.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.s390x" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.s390x" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.src as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.src" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.src", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.s390x" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.s390x" }, "product_reference": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.s390x" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x" }, "product_reference": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.s390x" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x" }, "product_reference": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.s390x" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x" }, "product_reference": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-2.el8_6.noarch as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-2.el8_6.noarch" }, "product_reference": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-2.el8_6.noarch", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-2.el8_6.noarch as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-2.el8_6.noarch" }, "product_reference": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-2.el8_6.noarch", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.s390x" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.s390x", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64" }, "product_reference": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le" }, "product_reference": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)", "product_id": "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64" }, "product_reference": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21540", "cwe": { "id": "CWE-402", "name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108540" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: class compilation issue (Hotspot, 8281859)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.src", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-2.el8_6.noarch", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-2.el8_6.noarch", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.src", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-2.el8_6.noarch", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-2.el8_6.noarch", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21540" }, { "category": "external", "summary": "RHBZ#2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21540", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21540" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-25T18:49:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.src", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-2.el8_6.noarch", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-2.el8_6.noarch", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.src", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-2.el8_6.noarch", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-2.el8_6.noarch", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5696" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.src", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-2.el8_6.noarch", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-2.el8_6.noarch", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.src", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-2.el8_6.noarch", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-2.el8_6.noarch", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: class compilation issue (Hotspot, 8281859)" }, { "cve": "CVE-2022-21541", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108543" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.src", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-2.el8_6.noarch", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-2.el8_6.noarch", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.src", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-2.el8_6.noarch", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-2.el8_6.noarch", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21541" }, { "category": "external", "summary": "RHBZ#2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21541", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21541" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-25T18:49:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.src", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-2.el8_6.noarch", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-2.el8_6.noarch", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.src", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-2.el8_6.noarch", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-2.el8_6.noarch", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5696" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.src", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-2.el8_6.noarch", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-2.el8_6.noarch", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.src", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-2.el8_6.noarch", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-2.el8_6.noarch", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)" }, { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108554" } ], "notes": [ { "category": "description", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.src", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-2.el8_6.noarch", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-2.el8_6.noarch", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.src", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-2.el8_6.noarch", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-2.el8_6.noarch", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "RHBZ#2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-34169", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-25T18:49:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.src", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-2.el8_6.noarch", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-2.el8_6.noarch", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.src", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-2.el8_6.noarch", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-2.el8_6.noarch", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5696" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.src", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-2.el8_6.noarch", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-2.el8_6.noarch", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.s390x", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.src", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-2.el8_6.noarch", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-2.el8_6.noarch", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.s390x", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-2.el8_6.x86_64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.aarch64", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.ppc64le", "CRB-8.6.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-2.el8_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)" } ] }
rhsa-2022_5756
Vulnerability from csaf_redhat
Published
2022-07-28 15:40
Modified
2024-11-26 03:09
Summary
Red Hat Security Advisory: OpenJDK 11.0.16 security update for Windows Builds
Notes
Topic
The Red Hat Build of OpenJDK 11 (java-11-openjdk) is now available for Windows.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The OpenJDK 11 packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.
This release of the Red Hat build of OpenJDK 11 (11.0.16) for Windows serves as a replacement for the Red Hat build of OpenJDK 11 (11.0.15) and includes security and bug fixes, and enhancements. For further information, refer to the release notes linked to in the References section.
Security Fix(es):
* OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540)
* OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541)
* OpenJDK: integer truncation issue in Xalan (JAXP, 8285407) (CVE-2022-34169)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Other Changes:
* Red Hat builds of OpenJDK now identify themselves as such in the version output of OpenJDK tools.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "The Red Hat Build of OpenJDK 11 (java-11-openjdk) is now available for Windows.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The OpenJDK 11 packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.\n\nThis release of the Red Hat build of OpenJDK 11 (11.0.16) for Windows serves as a replacement for the Red Hat build of OpenJDK 11 (11.0.15) and includes security and bug fixes, and enhancements. For further information, refer to the release notes linked to in the References section.\n\nSecurity Fix(es):\n\n* OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540)\n\n* OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541)\n\n* OpenJDK: integer truncation issue in Xalan (JAXP, 8285407) (CVE-2022-34169)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nOther Changes:\n\n* Red Hat builds of OpenJDK now identify themselves as such in the version output of OpenJDK tools.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:5756", "url": "https://access.redhat.com/errata/RHSA-2022:5756" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5756.json" } ], "title": "Red Hat Security Advisory: OpenJDK 11.0.16 security update for Windows Builds", "tracking": { "current_release_date": "2024-11-26T03:09:15+00:00", "generator": { "date": "2024-11-26T03:09:15+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2022:5756", "initial_release_date": "2022-07-28T15:40:42+00:00", "revision_history": [ { "date": "2022-07-28T15:40:42+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-07-28T15:40:42+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-26T03:09:15+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Build of OpenJDK 11.0.16", "product": { "name": "Red Hat Build of OpenJDK 11.0.16", "product_id": "Red Hat Build of OpenJDK 11.0.16", "product_identification_helper": { "cpe": "cpe:/a:redhat:openjdk:11::windows" } } } ], "category": "product_family", "name": "OpenJDK" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21540", "cwe": { "id": "CWE-402", "name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108540" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: class compilation issue (Hotspot, 8281859)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Build of OpenJDK 11.0.16" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21540" }, { "category": "external", "summary": "RHBZ#2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21540", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21540" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-28T15:40:42+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/openjdk/11/html/installing_and_using_openjdk_11_for_windows/index", "product_ids": [ "Red Hat Build of OpenJDK 11.0.16" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5756" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "Red Hat Build of OpenJDK 11.0.16" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: class compilation issue (Hotspot, 8281859)" }, { "cve": "CVE-2022-21541", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108543" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Build of OpenJDK 11.0.16" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21541" }, { "category": "external", "summary": "RHBZ#2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21541", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21541" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-28T15:40:42+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/openjdk/11/html/installing_and_using_openjdk_11_for_windows/index", "product_ids": [ "Red Hat Build of OpenJDK 11.0.16" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5756" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat Build of OpenJDK 11.0.16" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)" }, { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108554" } ], "notes": [ { "category": "description", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Build of OpenJDK 11.0.16" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "RHBZ#2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-34169", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-28T15:40:42+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/openjdk/11/html/installing_and_using_openjdk_11_for_windows/index", "product_ids": [ "Red Hat Build of OpenJDK 11.0.16" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5756" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat Build of OpenJDK 11.0.16" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)" } ] }
rhsa-2022_5755
Vulnerability from csaf_redhat
Published
2022-07-28 15:39
Modified
2024-11-26 03:08
Summary
Red Hat Security Advisory: OpenJDK 11.0.16 Security Update for Portable Linux Builds
Notes
Topic
The Red Hat Build of OpenJDK 11 (java-11-openjdk) is now available for portable Linux.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The OpenJDK 11 packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.
This release of the Red Hat build of OpenJDK 11 (11.0.16) for portable Linux serves as a replacement for the Red Hat build of OpenJDK 11 (11.0.15) and includes security and bug fixes, and enhancements. For further information, refer to the release notes linked to in the References section.
Security Fix(es):
* OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540)
* OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541)
* OpenJDK: integer truncation issue in Xalan (JAXP, 8285407) (CVE-2022-34169)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Other Changes:
* Red Hat builds of OpenJDK now identify themselves as such in the version output of OpenJDK tools.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "The Red Hat Build of OpenJDK 11 (java-11-openjdk) is now available for portable Linux.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The OpenJDK 11 packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.\n\nThis release of the Red Hat build of OpenJDK 11 (11.0.16) for portable Linux serves as a replacement for the Red Hat build of OpenJDK 11 (11.0.15) and includes security and bug fixes, and enhancements. For further information, refer to the release notes linked to in the References section.\n\nSecurity Fix(es):\n\n* OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540)\n\n* OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541)\n\n* OpenJDK: integer truncation issue in Xalan (JAXP, 8285407) (CVE-2022-34169)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nOther Changes:\n\n* Red Hat builds of OpenJDK now identify themselves as such in the version output of OpenJDK tools.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:5755", "url": "https://access.redhat.com/errata/RHSA-2022:5755" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5755.json" } ], "title": "Red Hat Security Advisory: OpenJDK 11.0.16 Security Update for Portable Linux Builds", "tracking": { "current_release_date": "2024-11-26T03:08:54+00:00", "generator": { "date": "2024-11-26T03:08:54+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2022:5755", "initial_release_date": "2022-07-28T15:39:57+00:00", "revision_history": [ { "date": "2022-07-28T15:39:57+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-07-28T15:39:57+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-26T03:08:54+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Build of OpenJDK 11.0.16", "product": { "name": "Red Hat Build of OpenJDK 11.0.16", "product_id": "Red Hat Build of OpenJDK 11.0.16", "product_identification_helper": { "cpe": "cpe:/a:redhat:openjdk:11" } } } ], "category": "product_family", "name": "OpenJDK" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21540", "cwe": { "id": "CWE-402", "name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108540" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: class compilation issue (Hotspot, 8281859)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Build of OpenJDK 11.0.16" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21540" }, { "category": "external", "summary": "RHBZ#2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21540", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21540" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-28T15:39:57+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/openjdk/11/html/installing_and_using_openjdk_11_on_rhel/installing-openjdk11-on-rhel8#installing-jdk11-on-rhel-using-archive_openjdk", "product_ids": [ "Red Hat Build of OpenJDK 11.0.16" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5755" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "Red Hat Build of OpenJDK 11.0.16" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: class compilation issue (Hotspot, 8281859)" }, { "cve": "CVE-2022-21541", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108543" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Build of OpenJDK 11.0.16" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21541" }, { "category": "external", "summary": "RHBZ#2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21541", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21541" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-28T15:39:57+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/openjdk/11/html/installing_and_using_openjdk_11_on_rhel/installing-openjdk11-on-rhel8#installing-jdk11-on-rhel-using-archive_openjdk", "product_ids": [ "Red Hat Build of OpenJDK 11.0.16" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5755" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat Build of OpenJDK 11.0.16" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)" }, { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108554" } ], "notes": [ { "category": "description", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Build of OpenJDK 11.0.16" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "RHBZ#2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-34169", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-28T15:39:57+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/openjdk/11/html/installing_and_using_openjdk_11_on_rhel/installing-openjdk11-on-rhel8#installing-jdk11-on-rhel-using-archive_openjdk", "product_ids": [ "Red Hat Build of OpenJDK 11.0.16" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5755" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat Build of OpenJDK 11.0.16" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)" } ] }
rhsa-2022_5754
Vulnerability from csaf_redhat
Published
2022-07-28 15:33
Modified
2024-11-26 03:08
Summary
Red Hat Security Advisory: OpenJDK 8u342 security update for Portable Linux Builds
Notes
Topic
The Red Hat build of OpenJDK 8 (java-1.8.0-openjdk) is now available for portable Linux.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The OpenJDK 8 packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.
This release of the Red Hat build of OpenJDK 8 (8u342) for portable Linux serves as a replacement for Red Hat build of OpenJDK 8 (8u332) and includes security and bug fixes as well as enhancements. For further information, refer to the release notes linked to in the References section.
Security Fix(es):
* OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540)
* OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541)
* OpenJDK: integer truncation issue in Xalan (JAXP, 8285407) (CVE-2022-34169)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "The Red Hat build of OpenJDK 8 (java-1.8.0-openjdk) is now available for portable Linux.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The OpenJDK 8 packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.\n\nThis release of the Red Hat build of OpenJDK 8 (8u342) for portable Linux serves as a replacement for Red Hat build of OpenJDK 8 (8u332) and includes security and bug fixes as well as enhancements. For further information, refer to the release notes linked to in the References section.\n\nSecurity Fix(es):\n* OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540)\n\n* OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541)\n\n* OpenJDK: integer truncation issue in Xalan (JAXP, 8285407) (CVE-2022-34169)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:5754", "url": "https://access.redhat.com/errata/RHSA-2022:5754" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5754.json" } ], "title": "Red Hat Security Advisory: OpenJDK 8u342 security update for Portable Linux Builds", "tracking": { "current_release_date": "2024-11-26T03:08:47+00:00", "generator": { "date": "2024-11-26T03:08:47+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2022:5754", "initial_release_date": "2022-07-28T15:33:08+00:00", "revision_history": [ { "date": "2022-07-28T15:33:08+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-07-28T15:33:08+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-26T03:08:47+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Build of OpenJDK 8u342", "product": { "name": "Red Hat Build of OpenJDK 8u342", "product_id": "Red Hat Build of OpenJDK 8u342", "product_identification_helper": { "cpe": "cpe:/a:redhat:openjdk:1.8" } } } ], "category": "product_family", "name": "OpenJDK" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21540", "cwe": { "id": "CWE-402", "name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108540" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: class compilation issue (Hotspot, 8281859)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Build of OpenJDK 8u342" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21540" }, { "category": "external", "summary": "RHBZ#2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21540", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21540" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-28T15:33:08+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/openjdk/8/html/installing_and_using_openjdk_8_for_rhel/assembly_installing-openjdk-8-on-red-hat-enterprise-linux_openjdk#installing-jdk11-on-rhel-using-archive_openjdk", "product_ids": [ "Red Hat Build of OpenJDK 8u342" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5754" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "Red Hat Build of OpenJDK 8u342" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: class compilation issue (Hotspot, 8281859)" }, { "cve": "CVE-2022-21541", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108543" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Build of OpenJDK 8u342" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21541" }, { "category": "external", "summary": "RHBZ#2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21541", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21541" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-28T15:33:08+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/openjdk/8/html/installing_and_using_openjdk_8_for_rhel/assembly_installing-openjdk-8-on-red-hat-enterprise-linux_openjdk#installing-jdk11-on-rhel-using-archive_openjdk", "product_ids": [ "Red Hat Build of OpenJDK 8u342" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5754" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat Build of OpenJDK 8u342" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)" }, { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108554" } ], "notes": [ { "category": "description", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Build of OpenJDK 8u342" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "RHBZ#2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-34169", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-28T15:33:08+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/openjdk/8/html/installing_and_using_openjdk_8_for_rhel/assembly_installing-openjdk-8-on-red-hat-enterprise-linux_openjdk#installing-jdk11-on-rhel-using-archive_openjdk", "product_ids": [ "Red Hat Build of OpenJDK 8u342" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5754" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat Build of OpenJDK 8u342" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)" } ] }
rhsa-2022_5701
Vulnerability from csaf_redhat
Published
2022-07-25 15:32
Modified
2024-11-26 03:08
Summary
Red Hat Security Advisory: java-1.8.0-openjdk security update
Notes
Topic
An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.
Security Fix(es):
* OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) (CVE-2022-34169)
* OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540)
* OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.\n\nSecurity Fix(es):\n\n* OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) (CVE-2022-34169)\n\n* OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540)\n\n* OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:5701", "url": "https://access.redhat.com/errata/RHSA-2022:5701" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5701.json" } ], "title": "Red Hat Security Advisory: java-1.8.0-openjdk security update", "tracking": { "current_release_date": "2024-11-26T03:08:03+00:00", "generator": { "date": "2024-11-26T03:08:03+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2022:5701", "initial_release_date": "2022-07-25T15:32:29+00:00", "revision_history": [ { "date": "2022-07-25T15:32:29+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-07-25T15:32:29+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-26T03:08:03+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product": { "name": "Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_e4s:8.1::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.src", "product": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.src", "product_id": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk@1.8.0.342.b07-1.el8_1?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.ppc64le", "product": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.ppc64le", "product_id": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk@1.8.0.342.b07-1.el8_1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_1.ppc64le", "product": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_1.ppc64le", "product_id": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility@1.8.0.342.b07-1.el8_1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_1.ppc64le", "product": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_1.ppc64le", "product_id": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo@1.8.0.342.b07-1.el8_1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_1.ppc64le", "product": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_1.ppc64le", "product_id": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel@1.8.0.342.b07-1.el8_1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_1.ppc64le", "product": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_1.ppc64le", "product_id": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless@1.8.0.342.b07-1.el8_1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_1.ppc64le", "product": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_1.ppc64le", "product_id": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src@1.8.0.342.b07-1.el8_1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_1.ppc64le", "product": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_1.ppc64le", "product_id": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debugsource@1.8.0.342.b07-1.el8_1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "product": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "product_id": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debuginfo@1.8.0.342.b07-1.el8_1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "product": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "product_id": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-debuginfo@1.8.0.342.b07-1.el8_1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "product": { "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "product_id": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-slowdebug-debuginfo@1.8.0.342.b07-1.el8_1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "product": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "product_id": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-debuginfo@1.8.0.342.b07-1.el8_1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "product": { "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "product_id": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-slowdebug-debuginfo@1.8.0.342.b07-1.el8_1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "product": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "product_id": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-debuginfo@1.8.0.342.b07-1.el8_1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "product": { "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "product_id": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-slowdebug-debuginfo@1.8.0.342.b07-1.el8_1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "product": { "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "product_id": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-slowdebug-debuginfo@1.8.0.342.b07-1.el8_1?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.x86_64", "product": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.x86_64", "product_id": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk@1.8.0.342.b07-1.el8_1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_1.x86_64", "product": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_1.x86_64", "product_id": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility@1.8.0.342.b07-1.el8_1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_1.x86_64", "product": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_1.x86_64", "product_id": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo@1.8.0.342.b07-1.el8_1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_1.x86_64", "product": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_1.x86_64", "product_id": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel@1.8.0.342.b07-1.el8_1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_1.x86_64", "product": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_1.x86_64", "product_id": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless@1.8.0.342.b07-1.el8_1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_1.x86_64", "product": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_1.x86_64", "product_id": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src@1.8.0.342.b07-1.el8_1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_1.x86_64", "product": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_1.x86_64", "product_id": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debugsource@1.8.0.342.b07-1.el8_1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "product": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "product_id": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debuginfo@1.8.0.342.b07-1.el8_1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "product": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "product_id": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-debuginfo@1.8.0.342.b07-1.el8_1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "product": { "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "product_id": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-slowdebug-debuginfo@1.8.0.342.b07-1.el8_1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "product": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "product_id": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-debuginfo@1.8.0.342.b07-1.el8_1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "product": { "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "product_id": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-slowdebug-debuginfo@1.8.0.342.b07-1.el8_1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "product": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "product_id": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-debuginfo@1.8.0.342.b07-1.el8_1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "product": { "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "product_id": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-slowdebug-debuginfo@1.8.0.342.b07-1.el8_1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "product": { "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "product_id": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-slowdebug-debuginfo@1.8.0.342.b07-1.el8_1?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_1.noarch", "product": { "name": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_1.noarch", "product_id": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-javadoc@1.8.0.342.b07-1.el8_1?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_1.noarch", "product": { "name": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_1.noarch", "product_id": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-javadoc-zip@1.8.0.342.b07-1.el8_1?arch=noarch\u0026epoch=1" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.ppc64le" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.src as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.src" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.src", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.x86_64" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_1.ppc64le" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_1.x86_64" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_1.ppc64le" }, "product_reference": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_1.x86_64" }, "product_reference": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_1.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_1.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_1.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_1.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_1.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_1.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_1.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_1.noarch" }, "product_reference": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_1.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_1.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_1.noarch" }, "product_reference": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_1.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le" }, "product_reference": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64" }, "product_reference": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_1.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_1.ppc64le" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_1.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_1.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_1.x86_64" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_1.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21540", "cwe": { "id": "CWE-402", "name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108540" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: class compilation issue (Hotspot, 8281859)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.src", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_1.noarch", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_1.noarch", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21540" }, { "category": "external", "summary": "RHBZ#2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21540", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21540" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-25T15:32:29+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.src", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_1.noarch", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_1.noarch", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5701" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.src", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_1.noarch", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_1.noarch", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: class compilation issue (Hotspot, 8281859)" }, { "cve": "CVE-2022-21541", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108543" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.src", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_1.noarch", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_1.noarch", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21541" }, { "category": "external", "summary": "RHBZ#2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21541", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21541" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-25T15:32:29+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.src", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_1.noarch", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_1.noarch", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5701" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.src", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_1.noarch", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_1.noarch", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)" }, { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108554" } ], "notes": [ { "category": "description", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.src", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_1.noarch", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_1.noarch", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "RHBZ#2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-34169", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-25T15:32:29+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.src", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_1.noarch", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_1.noarch", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5701" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.src", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_1.noarch", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_1.noarch", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_1.x86_64", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_1.ppc64le", "AppStream-8.1.0.Z.E4S:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)" } ] }
rhsa-2024_8077
Vulnerability from csaf_redhat
Published
2024-10-14 18:01
Modified
2024-12-17 21:03
Summary
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.19 Security update
Notes
Topic
An update is now available for Red Hat JBoss Enterprise Application Platform 7.4 for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 7.4.19 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.4.18, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.4.19 Release Notes for information about the most significant bug fixes and enhancements included in this release.
Security Fix(es):
* braces: fails to limit the number of characters it can handle [eap-7.4.z] (CVE-2024-4068)
* jose4j: denial of service via specially crafted JWE [eap-7.4.z] (CVE-2023-51775)
* wildfly-domain-http: wildfly: No timeout for EAP management interface may lead to Denial of Service (DoS) [eap-7.4.z] (CVE-2024-4029)
* xalan: integer truncation issue in Xalan-J (JAXP, 8285407) [eap-7.4.z] (CVE-2022-34169)
* org.jsoup/jsoup: The jsoup cleaner may incorrectly sanitize crafted XSS attempts if SafeList.preserveRelativeLinks is enabled [eap-7.4.z] (CVE-2022-36033)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgements, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat JBoss Enterprise Application Platform 7.4 for Red Hat Enterprise Linux 9.\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 7.4.19 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.4.18, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.4.19 Release Notes for information about the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* braces: fails to limit the number of characters it can handle [eap-7.4.z] (CVE-2024-4068)\n\n* jose4j: denial of service via specially crafted JWE [eap-7.4.z] (CVE-2023-51775)\n\n* wildfly-domain-http: wildfly: No timeout for EAP management interface may lead to Denial of Service (DoS) [eap-7.4.z] (CVE-2024-4029)\n\n* xalan: integer truncation issue in Xalan-J (JAXP, 8285407) [eap-7.4.z] (CVE-2022-34169)\n\n* org.jsoup/jsoup: The jsoup cleaner may incorrectly sanitize crafted XSS attempts if SafeList.preserveRelativeLinks is enabled [eap-7.4.z] (CVE-2022-36033)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgements, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:8077", "url": "https://access.redhat.com/errata/RHSA-2024:8077" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4", "url": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4" }, { "category": "external", "summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/index", "url": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/index" }, { "category": "external", "summary": "2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "2127078", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2127078" }, { "category": "external", "summary": "2266921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266921" }, { "category": "external", "summary": "2278615", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278615" }, { "category": "external", "summary": "2280600", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280600" }, { "category": "external", "summary": "JBEAP-27051", "url": "https://issues.redhat.com/browse/JBEAP-27051" }, { "category": "external", "summary": "JBEAP-27357", "url": "https://issues.redhat.com/browse/JBEAP-27357" }, { "category": "external", "summary": "JBEAP-27548", "url": "https://issues.redhat.com/browse/JBEAP-27548" }, { "category": "external", "summary": "JBEAP-27613", "url": "https://issues.redhat.com/browse/JBEAP-27613" }, { "category": "external", "summary": "JBEAP-27658", "url": "https://issues.redhat.com/browse/JBEAP-27658" }, { "category": "external", "summary": "JBEAP-27700", "url": "https://issues.redhat.com/browse/JBEAP-27700" }, { "category": "external", "summary": "JBEAP-27701", "url": "https://issues.redhat.com/browse/JBEAP-27701" }, { "category": "external", "summary": "JBEAP-27713", "url": "https://issues.redhat.com/browse/JBEAP-27713" }, { "category": "external", "summary": "JBEAP-27714", "url": "https://issues.redhat.com/browse/JBEAP-27714" }, { "category": "external", "summary": "JBEAP-27715", "url": "https://issues.redhat.com/browse/JBEAP-27715" }, { "category": "external", "summary": "JBEAP-27746", "url": "https://issues.redhat.com/browse/JBEAP-27746" }, { "category": "external", "summary": "JBEAP-27747", "url": "https://issues.redhat.com/browse/JBEAP-27747" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8077.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.19 Security update", "tracking": { "current_release_date": "2024-12-17T21:03:21+00:00", "generator": { "date": "2024-12-17T21:03:21+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2024:8077", "initial_release_date": "2024-10-14T18:01:43+00:00", "revision_history": [ { "date": "2024-10-14T18:01:43+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-10-14T18:01:43+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T21:03:21+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss EAP 7.4 for RHEL 9", "product": { "name": "Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" }, { "branches": [ { "category": "product_version", "name": "eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.src", "product": { "name": "eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.src", "product_id": "eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-undertow-jastow@2.0.15-1.Final_redhat_00001.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.src", "product": { "name": "eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.src", "product_id": "eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-hal-console@3.3.24-1.Final_redhat_00001.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.src", "product": { "name": "eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.src", "product_id": "eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-xalan-j2@2.7.1-37.redhat_00015.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.src", "product": { "name": "eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.src", "product_id": "eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jsoup@1.15.4-1.redhat_00003.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.src", "product": { "name": "eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.src", "product_id": "eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-hibernate-validator@6.0.23-2.SP1_redhat_00001.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "product": { "name": "eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "product_id": "eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-cert-helper@1.1.3-1.redhat_00001.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.src", "product": { "name": "eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.src", "product_id": "eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-ejb-client@4.0.55-1.Final_redhat_00001.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.src", "product": { "name": "eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.src", "product_id": "eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jbossws-cxf@5.4.12-1.Final_redhat_00001.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.src", "product": { "name": "eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.src", "product_id": "eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar@1.5.18-1.Final_redhat_00001.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "product": { "name": "eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "product_id": "eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-insights-java-client@1.1.3-1.redhat_00001.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.src", "product": { "name": "eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.src", "product_id": "eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration@1.10.0-39.Final_redhat_00039.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.src", "product": { "name": "eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.src", "product_id": "eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly@7.4.19-1.GA_redhat_00002.1.el9eap?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.noarch", "product": { "name": "eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.noarch", "product_id": "eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-undertow-jastow@2.0.15-1.Final_redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.noarch", "product": { "name": "eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.noarch", "product_id": "eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-hal-console@3.3.24-1.Final_redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.noarch", "product": { "name": "eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.noarch", "product_id": "eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-xalan-j2@2.7.1-37.redhat_00015.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.noarch", "product": { "name": "eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.noarch", "product_id": "eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jsoup@1.15.4-1.redhat_00003.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "product": { "name": "eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "product_id": "eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-hibernate-validator@6.0.23-2.SP1_redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "product": { "name": "eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "product_id": "eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-hibernate-validator-cdi@6.0.23-2.SP1_redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.noarch", "product": { "name": "eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.noarch", "product_id": "eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-ejb-client@4.0.55-1.Final_redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.noarch", "product": { "name": "eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.noarch", "product_id": "eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jbossws-cxf@5.4.12-1.Final_redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "product": { "name": "eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "product_id": "eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar@1.5.18-1.Final_redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "product": { "name": "eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "product_id": "eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-common-api@1.5.18-1.Final_redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "product": { "name": "eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "product_id": "eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-common-impl@1.5.18-1.Final_redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "product": { "name": "eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "product_id": "eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-common-spi@1.5.18-1.Final_redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "product": { "name": "eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "product_id": "eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-core-api@1.5.18-1.Final_redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "product": { "name": "eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "product_id": "eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-core-impl@1.5.18-1.Final_redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "product": { "name": "eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "product_id": "eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-deployers-common@1.5.18-1.Final_redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "product": { "name": "eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "product_id": "eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-jdbc@1.5.18-1.Final_redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "product": { "name": "eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "product_id": "eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-validator@1.5.18-1.Final_redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "product": { "name": "eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "product_id": "eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-insights-java-client@1.1.3-1.redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "product": { "name": "eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "product_id": "eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration@1.10.0-39.Final_redhat_00039.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "product": { "name": "eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "product_id": "eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-cli@1.10.0-39.Final_redhat_00039.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "product": { "name": "eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "product_id": "eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-core@1.10.0-39.Final_redhat_00039.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "product": { "name": "eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "product_id": "eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly@7.4.19-1.GA_redhat_00002.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "product": { "name": "eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "product_id": "eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk11@7.4.19-1.GA_redhat_00002.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "product": { "name": "eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "product_id": "eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk17@7.4.19-1.GA_redhat_00002.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "product": { "name": "eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "product_id": "eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk8@7.4.19-1.GA_redhat_00002.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "product": { "name": "eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "product_id": "eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-javadocs@7.4.19-1.GA_redhat_00002.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "product": { "name": "eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "product_id": "eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-modules@7.4.19-1.GA_redhat_00002.1.el9eap?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "product": { "name": "eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "product_id": "eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-cert-helper@1.1.3-1.redhat_00001.1.el9eap?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.noarch" }, "product_reference": "eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.src" }, "product_reference": "eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch" }, "product_reference": "eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.src" }, "product_reference": "eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch" }, "product_reference": "eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch" }, "product_reference": "eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src" }, "product_reference": "eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch" }, "product_reference": "eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.src" }, "product_reference": "eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch" }, "product_reference": "eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch" }, "product_reference": "eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch" }, "product_reference": "eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch" }, "product_reference": "eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch" }, "product_reference": "eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch" }, "product_reference": "eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch" }, "product_reference": "eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch" }, "product_reference": "eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src" }, "product_reference": "eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64 as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64" }, "product_reference": "eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "relates_to_product_reference": "9Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.noarch" }, "product_reference": "eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.src" }, "product_reference": "eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch" }, "product_reference": "eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.src" }, "product_reference": "eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch" }, "product_reference": "eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch" }, "product_reference": "eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.noarch" }, "product_reference": "eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.src" }, "product_reference": "eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.noarch" }, "product_reference": "eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.src" }, "product_reference": "eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.noarch" }, "product_reference": "eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.src" }, "product_reference": "eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch" }, "product_reference": "eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.src" }, "product_reference": "eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch" }, "product_reference": "eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch" }, "product_reference": "eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch" }, "product_reference": "eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch" }, "product_reference": "eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch" }, "product_reference": "eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.noarch" }, "product_reference": "eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9", "product_id": "9Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.src" }, "product_reference": "eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-7.4" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108554" } ], "notes": [ { "category": "description", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.src", "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.src", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "RHBZ#2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-34169", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-14T18:01:43+00:00", "details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "9Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.src", "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.src", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8077" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "9Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.src", "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.src", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)" }, { "cve": "CVE-2022-36033", "cwe": { "id": "CWE-87", "name": "Improper Neutralization of Alternate XSS Syntax" }, "discovery_date": "2022-09-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2127078" } ], "notes": [ { "category": "description", "text": "A flaw was found in jsoup, a Java HTML parser built for HTML editing, cleaning, scraping, and Cross-site scripting (XSS) safety. An issue in jsoup may incorrectly sanitize HTML, including `javascript:` URL expressions, which could allow XSS attacks when a reader subsequently clicks that link. If the non-default `SafeList.preserveRelativeLinks` option is enabled, HTML, including `javascript:` URLs crafted with control characters, will not be sanitized. If the site that this HTML is published on does not set a Content Security Policy, an XSS attack is possible.", "title": "Vulnerability description" }, { "category": "summary", "text": "jsoup: The jsoup cleaner may incorrectly sanitize crafted XSS attempts if SafeList.preserveRelativeLinks is enabled", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.src", "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.src", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-36033" }, { "category": "external", "summary": "RHBZ#2127078", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2127078" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-36033", "url": "https://www.cve.org/CVERecord?id=CVE-2022-36033" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-36033", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-36033" } ], "release_date": "2022-08-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-14T18:01:43+00:00", "details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "9Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.src", "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.src", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8077" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "9Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.src", "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.src", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jsoup: The jsoup cleaner may incorrectly sanitize crafted XSS attempts if SafeList.preserveRelativeLinks is enabled" }, { "cve": "CVE-2023-51775", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2024-02-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2266921" } ], "notes": [ { "category": "description", "text": "A flaw was found in the jose.4.j (jose4j) library. The JWE key management algorithms based on PBKDF2 require a JOSE Header Parameter called p2c (PBES2 Count). This parameter dictates the number of PBKDF2 iterations needed to derive a CEK wrapping key. Its primary purpose is to intentionally slow down the key derivation function, making password brute-force and dictionary attacks more resource-intensive. However, if an attacker sets the p2c parameter in JWE to a large number, it can cause high computational consumption, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "jose4j: denial of service via specially crafted JWE", "title": "Vulnerability summary" }, { "category": "other", "text": "The vulnerability in the jose4j library, where the \"p2c\" parameter in PBKDF2-based JWE key management algorithms can be manipulated to induce high computational consumption, is classified as moderate severity due to its potential impact on service availability and resource exhaustion. By setting a large value for \"p2c\", an attacker can force the server to perform an excessive number of PBKDF2 iterations during key derivation. This results in increased CPU and memory usage, potentially leading to degraded performance or temporary denial of service.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.src", "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.src", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-51775" }, { "category": "external", "summary": "RHBZ#2266921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266921" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-51775", "url": "https://www.cve.org/CVERecord?id=CVE-2023-51775" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-51775", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-51775" } ], "release_date": "2024-02-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-14T18:01:43+00:00", "details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "9Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.src", "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.src", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8077" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "9Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.src", "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.src", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.src", "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.src", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jose4j: denial of service via specially crafted JWE" }, { "cve": "CVE-2024-4029", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2024-04-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2278615" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Wildfly\u2019s management interface. Due to the lack of limitation of sockets for the management interface, it may be possible to cause a denial of service hitting the nofile limit as there is no possibility to configure or set a maximum number of connections.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly: No timeout for EAP management interface may lead to Denial of Service (DoS)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat rates this as a Low impact since this requires high privileges to jeopardize the system. The management interface is normally internal/local only and not exposed externally.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.src", "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.src", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-4029" }, { "category": "external", "summary": "RHBZ#2278615", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278615" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-4029", "url": "https://www.cve.org/CVERecord?id=CVE-2024-4029" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-4029", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4029" } ], "release_date": "2024-05-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-14T18:01:43+00:00", "details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "9Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.src", "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.src", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8077" }, { "category": "workaround", "details": "Currently there is no available mitigation for this vulnerability. Please make sure to perform updates as they become available.", "product_ids": [ "9Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.src", "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.src", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.src", "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.src", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.src" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "wildfly: No timeout for EAP management interface may lead to Denial of Service (DoS)" }, { "cve": "CVE-2024-4068", "cwe": { "id": "CWE-1050", "name": "Excessive Platform Resource Consumption within a Loop" }, "discovery_date": "2024-05-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2280600" } ], "notes": [ { "category": "description", "text": "A flaw was found in the NPM package `braces.` It fails to limit the number of characters it can handle, which could lead to memory exhaustion. In `lib/parse.js,` if a malicious user sends \"imbalanced braces\" as input, the parsing will enter a loop, causing the program to start allocating heap memory without freeing it at any moment of the loop. Eventually, the JavaScript heap limit is reached, and the program will crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "braces: fails to limit the number of characters it can handle", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.src", "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.src", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-4068" }, { "category": "external", "summary": "RHBZ#2280600", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280600" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-4068", "url": "https://www.cve.org/CVERecord?id=CVE-2024-4068" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-4068", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4068" }, { "category": "external", "summary": "https://devhub.checkmarx.com/cve-details/CVE-2024-4068/", "url": "https://devhub.checkmarx.com/cve-details/CVE-2024-4068/" }, { "category": "external", "summary": "https://github.com/micromatch/braces/blob/98414f9f1fabe021736e26836d8306d5de747e0d/lib/parse.js#L308", "url": "https://github.com/micromatch/braces/blob/98414f9f1fabe021736e26836d8306d5de747e0d/lib/parse.js#L308" }, { "category": "external", "summary": "https://github.com/micromatch/braces/issues/35", "url": "https://github.com/micromatch/braces/issues/35" } ], "release_date": "2024-03-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-14T18:01:43+00:00", "details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "9Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.src", "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.src", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8077" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "9Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.src", "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.src", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el9eap.src", "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el9eap.src", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el9eap.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "braces: fails to limit the number of characters it can handle" } ] }
rhsa-2024_3708
Vulnerability from csaf_redhat
Published
2024-06-06 16:42
Modified
2024-12-12 09:55
Summary
Red Hat Security Advisory: Red Hat Build of Apache Camel 3.20.6 for Spring Boot security update.
Notes
Topic
Red Hat build of Apache Camel 3.20.6 for Spring Boot release and security update is now available.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat build of Apache Camel 3.20.6 for Spring Boot release and security update is now available.
The purpose of this text-only errata is to inform you about the security issues fixed.
Security Fix(es):
* xalan: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) (CVE-2022-34169)
* jettison: stack overflow in JSONObject() allows attackers to cause a Denial of Service (DoS) via crafted JSON data (CVE-2022-45685)
* santuario: Private Key disclosure in debug-log output (CVE-2023-44483)
* springframework: URL Parsing with Host Validation (CVE-2024-22262)
* cxf-core: Apache CXF SSRF Vulnerability using the Aegis databinding (CVE-2024-28752)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat build of Apache Camel 3.20.6 for Spring Boot release and security update is now available.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat build of Apache Camel 3.20.6 for Spring Boot release and security update is now available.\n\nThe purpose of this text-only errata is to inform you about the security issues fixed.\n\nSecurity Fix(es):\n\n* xalan: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) (CVE-2022-34169)\n\n* jettison: stack overflow in JSONObject() allows attackers to cause a Denial of Service (DoS) via crafted JSON data (CVE-2022-45685)\n\n* santuario: Private Key disclosure in debug-log output (CVE-2023-44483)\n\n* springframework: URL Parsing with Host Validation (CVE-2024-22262)\n\n* cxf-core: Apache CXF SSRF Vulnerability using the Aegis databinding (CVE-2024-28752)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:3708", "url": "https://access.redhat.com/errata/RHSA-2024:3708" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "2214825", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2214825" }, { "category": "external", "summary": "2246070", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2246070" }, { "category": "external", "summary": "2270732", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270732" }, { "category": "external", "summary": "2275257", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275257" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_3708.json" } ], "title": "Red Hat Security Advisory: Red Hat Build of Apache Camel 3.20.6 for Spring Boot security update.", "tracking": { "current_release_date": "2024-12-12T09:55:33+00:00", "generator": { "date": "2024-12-12T09:55:33+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2024:3708", "initial_release_date": "2024-06-06T16:42:04+00:00", "revision_history": [ { "date": "2024-06-06T16:42:04+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-06-06T16:42:04+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-12T09:55:33+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat build of Apache Camel 3.20.6 for Spring Boot", "product": { "name": "Red Hat build of Apache Camel 3.20.6 for Spring Boot", "product_id": "Red Hat build of Apache Camel 3.20.6 for Spring Boot", "product_identification_helper": { "cpe": "cpe:/a:redhat:apache_camel_spring_boot:3.20.6" } } } ], "category": "product_family", "name": "Red Hat Build of Apache Camel" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108554" } ], "notes": [ { "category": "description", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat build of Apache Camel 3.20.6 for Spring Boot" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "RHBZ#2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-34169", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-06-06T16:42:04+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat build of Apache Camel 3.20.6 for Spring Boot" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:3708" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat build of Apache Camel 3.20.6 for Spring Boot" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)" }, { "cve": "CVE-2022-45685", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2023-06-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2214825" } ], "notes": [ { "category": "description", "text": "A flaw was found in Jettison. Sending a specially crafted string can cause a stack-based buffer overflow. This issue may allow a remote attacker to cause a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "jettison: stack overflow in JSONObject() allows attackers to cause a Denial of Service (DoS) via crafted JSON data", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat has determined the impact of this flaw to be Moderate. A successful attack using this flaw would require the processing of untrusted, unsanitized, or unrestricted user inputs, which runs counter to established Red Hat security practices.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat build of Apache Camel 3.20.6 for Spring Boot" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-45685" }, { "category": "external", "summary": "RHBZ#2214825", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2214825" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-45685", "url": "https://www.cve.org/CVERecord?id=CVE-2022-45685" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-45685", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-45685" } ], "release_date": "2022-12-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-06-06T16:42:04+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat build of Apache Camel 3.20.6 for Spring Boot" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:3708" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat build of Apache Camel 3.20.6 for Spring Boot" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jettison: stack overflow in JSONObject() allows attackers to cause a Denial of Service (DoS) via crafted JSON data" }, { "cve": "CVE-2023-44483", "cwe": { "id": "CWE-532", "name": "Insertion of Sensitive Information into Log File" }, "discovery_date": "2023-10-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2246070" } ], "notes": [ { "category": "description", "text": "All versions of Apache Santuario - XML Security for Java prior to 2.2.6, 2.3.4, and 3.0.3, when using the JSR 105 API, are vulnerable to an issue where a private key may be disclosed in log files when generating an XML Signature and logging with debug level is enabled.\u00a0Users are recommended to upgrade to version 2.2.6, 2.3.4, or 3.0.3, which fixes this issue.\n", "title": "Vulnerability description" }, { "category": "summary", "text": "santuario: Private Key disclosure in debug-log output", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat build of Apache Camel 3.20.6 for Spring Boot" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-44483" }, { "category": "external", "summary": "RHBZ#2246070", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2246070" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-44483", "url": "https://www.cve.org/CVERecord?id=CVE-2023-44483" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-44483", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-44483" }, { "category": "external", "summary": "http://www.openwall.com/lists/oss-security/2023/10/20/5", "url": "http://www.openwall.com/lists/oss-security/2023/10/20/5" }, { "category": "external", "summary": "https://lists.apache.org/thread/vmqbp9mfxtrf0kmbnnmbn3h9j6dr9q55", "url": "https://lists.apache.org/thread/vmqbp9mfxtrf0kmbnnmbn3h9j6dr9q55" } ], "release_date": "2023-10-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-06-06T16:42:04+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat build of Apache Camel 3.20.6 for Spring Boot" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:3708" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "Red Hat build of Apache Camel 3.20.6 for Spring Boot" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "santuario: Private Key disclosure in debug-log output" }, { "cve": "CVE-2024-22262", "cwe": { "id": "CWE-601", "name": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)" }, "discovery_date": "2024-04-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2275257" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Spring Framework. Applications that use UriComponentsBuilder to parse an externally provided URL, for example, through a query parameter, and perform validation checks on the host of the parsed URL may be vulnerable to an open redirect attack or an SSRF attack if the URL is used after passing validation checks.", "title": "Vulnerability description" }, { "category": "summary", "text": "springframework: URL Parsing with Host Validation", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Fuse 7 does not use the affected function, but the function is still available for user convenience which demands one to validate the input.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat build of Apache Camel 3.20.6 for Spring Boot" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-22262" }, { "category": "external", "summary": "RHBZ#2275257", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2275257" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-22262", "url": "https://www.cve.org/CVERecord?id=CVE-2024-22262" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-22262", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-22262" }, { "category": "external", "summary": "https://spring.io/security/cve-2024-22262", "url": "https://spring.io/security/cve-2024-22262" } ], "release_date": "2024-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-06-06T16:42:04+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat build of Apache Camel 3.20.6 for Spring Boot" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:3708" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Red Hat build of Apache Camel 3.20.6 for Spring Boot" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat build of Apache Camel 3.20.6 for Spring Boot" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "springframework: URL Parsing with Host Validation" }, { "cve": "CVE-2024-28752", "cwe": { "id": "CWE-918", "name": "Server-Side Request Forgery (SSRF)" }, "discovery_date": "2024-03-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2270732" } ], "notes": [ { "category": "description", "text": "A server-side request forgery (SSRF) vulnerability was found in Apache CXF. This issue occurs in attacks on webservices that take at least one parameter of any type, and when Aegisdatabind is used. Users of other data bindings including the default databinding are not impacted.", "title": "Vulnerability description" }, { "category": "summary", "text": "cxf-core: Apache CXF SSRF Vulnerability using the Aegis databinding", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat rates this as an Important impact due to the fact this requires Aegis databind, which is not the default databinding for Apache CXF.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat build of Apache Camel 3.20.6 for Spring Boot" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-28752" }, { "category": "external", "summary": "RHBZ#2270732", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270732" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-28752", "url": "https://www.cve.org/CVERecord?id=CVE-2024-28752" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-28752", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-28752" }, { "category": "external", "summary": "https://cxf.apache.org/security-advisories.data/CVE-2024-28752.txt", "url": "https://cxf.apache.org/security-advisories.data/CVE-2024-28752.txt" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-qmgx-j96g-4428", "url": "https://github.com/advisories/GHSA-qmgx-j96g-4428" } ], "release_date": "2024-03-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-06-06T16:42:04+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat build of Apache Camel 3.20.6 for Spring Boot" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:3708" }, { "category": "workaround", "details": "No mitigation is currently available for this vulnerability. Please make sure to update as the fixes become available.", "product_ids": [ "Red Hat build of Apache Camel 3.20.6 for Spring Boot" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat build of Apache Camel 3.20.6 for Spring Boot" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "cxf-core: Apache CXF SSRF Vulnerability using the Aegis databinding" } ] }
rhsa-2022_5758
Vulnerability from csaf_redhat
Published
2022-07-28 15:46
Modified
2024-11-26 03:09
Summary
Red Hat Security Advisory: OpenJDK 17.0.4 Security Update for Portable Linux Builds
Notes
Topic
The Red Hat build of OpenJDK 17 (java-17-openjdk) is now available for portable Linux.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The OpenJDK 17 packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit.
This release of the Red Hat build of OpenJDK 17 (17.0.4) for portable Linux
serves as a replacement for the Red Hat build of OpenJDK 17 (17.0.3) and
includes security and bug fixes, and enhancements. For further information,
refer to the release notes linked to in the References section.
Security Fix(es):
* OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540)
* OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541)
* OpenJDK: integer truncation issue in Xalan (JAXP, 8285407) (CVE-2022-34169)
* OpenJDK: random exponentials issue (Libraries, 8283875) (CVE-2022-21549)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Other Changes:
* Red Hat builds of OpenJDK now identify themselves as such in the version output of OpenJDK tools.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "The Red Hat build of OpenJDK 17 (java-17-openjdk) is now available for portable Linux.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The OpenJDK 17 packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit.\n\nThis release of the Red Hat build of OpenJDK 17 (17.0.4) for portable Linux\nserves as a replacement for the Red Hat build of OpenJDK 17 (17.0.3) and\nincludes security and bug fixes, and enhancements. For further information,\nrefer to the release notes linked to in the References section.\n\nSecurity Fix(es):\n\n* OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540)\n\n* OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541)\n\n* OpenJDK: integer truncation issue in Xalan (JAXP, 8285407) (CVE-2022-34169)\n\n* OpenJDK: random exponentials issue (Libraries, 8283875) (CVE-2022-21549)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nOther Changes:\n\n* Red Hat builds of OpenJDK now identify themselves as such in the version output of OpenJDK tools.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:5758", "url": "https://access.redhat.com/errata/RHSA-2022:5758" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "2108547", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108547" }, { "category": "external", "summary": "2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5758.json" } ], "title": "Red Hat Security Advisory: OpenJDK 17.0.4 Security Update for Portable Linux Builds", "tracking": { "current_release_date": "2024-11-26T03:09:08+00:00", "generator": { "date": "2024-11-26T03:09:08+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2022:5758", "initial_release_date": "2022-07-28T15:46:45+00:00", "revision_history": [ { "date": "2022-07-28T15:46:45+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-07-28T15:46:45+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-26T03:09:08+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Build of OpenJDK 17.0.4", "product": { "name": "Red Hat Build of OpenJDK 17.0.4", "product_id": "Red Hat Build of OpenJDK 17.0.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:openjdk:17" } } } ], "category": "product_family", "name": "OpenJDK" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21540", "cwe": { "id": "CWE-402", "name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108540" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: class compilation issue (Hotspot, 8281859)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Build of OpenJDK 17.0.4" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21540" }, { "category": "external", "summary": "RHBZ#2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21540", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21540" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-28T15:46:45+00:00", "details": "Before applying this update, make sure all previously-released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/openjdk/17/html/installing_and_using_openjdk_17_on_rhel/installing-openjdk11-on-rhel8_openjdk#installing-jdk11-on-rhel-using-archive_openjdk", "product_ids": [ "Red Hat Build of OpenJDK 17.0.4" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5758" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "Red Hat Build of OpenJDK 17.0.4" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: class compilation issue (Hotspot, 8281859)" }, { "cve": "CVE-2022-21541", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108543" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Build of OpenJDK 17.0.4" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21541" }, { "category": "external", "summary": "RHBZ#2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21541", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21541" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-28T15:46:45+00:00", "details": "Before applying this update, make sure all previously-released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/openjdk/17/html/installing_and_using_openjdk_17_on_rhel/installing-openjdk11-on-rhel8_openjdk#installing-jdk11-on-rhel-using-archive_openjdk", "product_ids": [ "Red Hat Build of OpenJDK 17.0.4" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5758" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat Build of OpenJDK 17.0.4" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)" }, { "cve": "CVE-2022-21549", "cwe": { "id": "CWE-1068", "name": "Inconsistency Between Implementation and Documented Design" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108547" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 17.0.3.1; Oracle GraalVM Enterprise Edition: 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: random exponentials issue (Libraries, 8283875)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Build of OpenJDK 17.0.4" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21549" }, { "category": "external", "summary": "RHBZ#2108547", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108547" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21549", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21549" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21549", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21549" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-28T15:46:45+00:00", "details": "Before applying this update, make sure all previously-released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/openjdk/17/html/installing_and_using_openjdk_17_on_rhel/installing-openjdk11-on-rhel8_openjdk#installing-jdk11-on-rhel-using-archive_openjdk", "product_ids": [ "Red Hat Build of OpenJDK 17.0.4" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5758" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "Red Hat Build of OpenJDK 17.0.4" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: random exponentials issue (Libraries, 8283875)" }, { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108554" } ], "notes": [ { "category": "description", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Build of OpenJDK 17.0.4" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "RHBZ#2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-34169", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-28T15:46:45+00:00", "details": "Before applying this update, make sure all previously-released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/openjdk/17/html/installing_and_using_openjdk_17_on_rhel/installing-openjdk11-on-rhel8_openjdk#installing-jdk11-on-rhel-using-archive_openjdk", "product_ids": [ "Red Hat Build of OpenJDK 17.0.4" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5758" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat Build of OpenJDK 17.0.4" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)" } ] }
rhsa-2022_5698
Vulnerability from csaf_redhat
Published
2022-07-25 18:53
Modified
2024-11-26 03:08
Summary
Red Hat Security Advisory: java-1.8.0-openjdk security, bug fix, and enhancement update
Notes
Topic
An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.
The following packages have been upgraded to a later upstream version: java-1.8.0-openjdk (1.8.0.342.b07). (BZ#2083257)
Security Fix(es):
* OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) (CVE-2022-34169)
* OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540)
* OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.\n\nThe following packages have been upgraded to a later upstream version: java-1.8.0-openjdk (1.8.0.342.b07). (BZ#2083257)\n\nSecurity Fix(es):\n\n* OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) (CVE-2022-34169)\n\n* OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540)\n\n* OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:5698", "url": "https://access.redhat.com/errata/RHSA-2022:5698" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2083257", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2083257" }, { "category": "external", "summary": "2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5698.json" } ], "title": "Red Hat Security Advisory: java-1.8.0-openjdk security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-11-26T03:08:27+00:00", "generator": { "date": "2024-11-26T03:08:27+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2022:5698", "initial_release_date": "2022-07-25T18:53:32+00:00", "revision_history": [ { "date": "2022-07-25T18:53:32+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-07-25T18:53:32+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-26T03:08:27+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "product": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "product_id": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk@1.8.0.342.b07-1.el7_9?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "product": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "product_id": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk@1.8.0.342.b07-1.el7_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "product": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "product_id": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless@1.8.0.342.b07-1.el7_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "product": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "product_id": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debuginfo@1.8.0.342.b07-1.el7_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "product": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "product_id": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility@1.8.0.342.b07-1.el7_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "product": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "product_id": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo@1.8.0.342.b07-1.el7_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "product": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "product_id": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel@1.8.0.342.b07-1.el7_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "product": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "product_id": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src@1.8.0.342.b07-1.el7_9?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "product": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "product_id": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk@1.8.0.342.b07-1.el7_9?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "product": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "product_id": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless@1.8.0.342.b07-1.el7_9?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "product": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "product_id": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debuginfo@1.8.0.342.b07-1.el7_9?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "product": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "product_id": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility@1.8.0.342.b07-1.el7_9?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "product": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "product_id": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo@1.8.0.342.b07-1.el7_9?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "product": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "product_id": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel@1.8.0.342.b07-1.el7_9?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "product": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "product_id": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src@1.8.0.342.b07-1.el7_9?arch=i686\u0026epoch=1" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "product": { "name": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "product_id": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-javadoc@1.8.0.342.b07-1.el7_9?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "product": { "name": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "product_id": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-javadoc-zip@1.8.0.342.b07-1.el7_9?arch=noarch\u0026epoch=1" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "product": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "product_id": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk@1.8.0.342.b07-1.el7_9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "product": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "product_id": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel@1.8.0.342.b07-1.el7_9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "product": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "product_id": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless@1.8.0.342.b07-1.el7_9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "product": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "product_id": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debuginfo@1.8.0.342.b07-1.el7_9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "product": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "product_id": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility@1.8.0.342.b07-1.el7_9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "product": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "product_id": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo@1.8.0.342.b07-1.el7_9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "product": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "product_id": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src@1.8.0.342.b07-1.el7_9?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "product": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "product_id": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk@1.8.0.342.b07-1.el7_9?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "product": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "product_id": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel@1.8.0.342.b07-1.el7_9?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "product": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "product_id": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless@1.8.0.342.b07-1.el7_9?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "product": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "product_id": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debuginfo@1.8.0.342.b07-1.el7_9?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "product": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "product_id": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility@1.8.0.342.b07-1.el7_9?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "product": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "product_id": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo@1.8.0.342.b07-1.el7_9?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "product": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "product_id": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src@1.8.0.342.b07-1.el7_9?arch=ppc64\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "product": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "product_id": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk@1.8.0.342.b07-1.el7_9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "product": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "product_id": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel@1.8.0.342.b07-1.el7_9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "product": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "product_id": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless@1.8.0.342.b07-1.el7_9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "product": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "product_id": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debuginfo@1.8.0.342.b07-1.el7_9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "product": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "product_id": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility@1.8.0.342.b07-1.el7_9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "product": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "product_id": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo@1.8.0.342.b07-1.el7_9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "product": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "product_id": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src@1.8.0.342.b07-1.el7_9?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch" }, "product_reference": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch" }, "product_reference": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Client-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch" }, "product_reference": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch" }, "product_reference": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Client-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch" }, "product_reference": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch" }, "product_reference": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch" }, "product_reference": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch" }, "product_reference": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Server-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch" }, "product_reference": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch" }, "product_reference": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch" }, "product_reference": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch" }, "product_reference": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch" }, "product_reference": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch" }, "product_reference": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-optional-7.9.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-optional-7.9.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21540", "cwe": { "id": "CWE-402", "name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108540" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: class compilation issue (Hotspot, 8281859)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Client-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Client-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Server-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Server-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Workstation-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21540" }, { "category": "external", "summary": "RHBZ#2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21540", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21540" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-25T18:53:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Client-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Client-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Server-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Server-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Workstation-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5698" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Client-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Client-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Server-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Server-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Workstation-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: class compilation issue (Hotspot, 8281859)" }, { "cve": "CVE-2022-21541", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108543" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Client-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Client-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Server-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Server-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Workstation-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21541" }, { "category": "external", "summary": "RHBZ#2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21541", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21541" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-25T18:53:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Client-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Client-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Server-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Server-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Workstation-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5698" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Client-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Client-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Server-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Server-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Workstation-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)" }, { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108554" } ], "notes": [ { "category": "description", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Client-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Client-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Server-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Server-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Workstation-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "RHBZ#2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-34169", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-25T18:53:32+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Client-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Client-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Server-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Server-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Workstation-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5698" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Client-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Client-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Client-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Client-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Client-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7ComputeNode-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Server-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Server-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Server-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Server-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Server-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Workstation-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Workstation-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.src", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el7_9.x86_64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el7_9.noarch", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el7_9.noarch", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.i686", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.ppc64le", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.s390x", "7Workstation-optional-7.9.Z:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)" } ] }
rhsa-2024_8076
Vulnerability from csaf_redhat
Published
2024-10-14 18:01
Modified
2024-12-17 21:03
Summary
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.19 Security update
Notes
Topic
An update is now available for Red Hat JBoss Enterprise Application Platform 7.4 for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 7.4.19 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.4.18, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.4.19 Release Notes for information about the most significant bug fixes and enhancements included in this release.
Security Fix(es):
* braces: fails to limit the number of characters it can handle [eap-7.4.z] (CVE-2024-4068)
* jose4j: denial of service via specially crafted JWE [eap-7.4.z] (CVE-2023-51775)
* wildfly-domain-http: wildfly: No timeout for EAP management interface may lead to Denial of Service (DoS) [eap-7.4.z] (CVE-2024-4029)
* xalan: integer truncation issue in Xalan-J (JAXP, 8285407) [eap-7.4.z] (CVE-2022-34169)
* org.jsoup/jsoup: The jsoup cleaner may incorrectly sanitize crafted XSS attempts if SafeList.preserveRelativeLinks is enabled [eap-7.4.z] (CVE-2022-36033)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgements, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat JBoss Enterprise Application Platform 7.4 for Red Hat Enterprise Linux 8.\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 7.4.19 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.4.18, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.4.19 Release Notes for information about the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* braces: fails to limit the number of characters it can handle [eap-7.4.z] (CVE-2024-4068)\n\n* jose4j: denial of service via specially crafted JWE [eap-7.4.z] (CVE-2023-51775)\n\n* wildfly-domain-http: wildfly: No timeout for EAP management interface may lead to Denial of Service (DoS) [eap-7.4.z] (CVE-2024-4029)\n\n* xalan: integer truncation issue in Xalan-J (JAXP, 8285407) [eap-7.4.z] (CVE-2022-34169)\n\n* org.jsoup/jsoup: The jsoup cleaner may incorrectly sanitize crafted XSS attempts if SafeList.preserveRelativeLinks is enabled [eap-7.4.z] (CVE-2022-36033)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgements, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:8076", "url": "https://access.redhat.com/errata/RHSA-2024:8076" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4", "url": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4" }, { "category": "external", "summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/index", "url": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/index" }, { "category": "external", "summary": "2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "2127078", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2127078" }, { "category": "external", "summary": "2266921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266921" }, { "category": "external", "summary": "2278615", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278615" }, { "category": "external", "summary": "2280600", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280600" }, { "category": "external", "summary": "JBEAP-27050", "url": "https://issues.redhat.com/browse/JBEAP-27050" }, { "category": "external", "summary": "JBEAP-27357", "url": "https://issues.redhat.com/browse/JBEAP-27357" }, { "category": "external", "summary": "JBEAP-27548", "url": "https://issues.redhat.com/browse/JBEAP-27548" }, { "category": "external", "summary": "JBEAP-27613", "url": "https://issues.redhat.com/browse/JBEAP-27613" }, { "category": "external", "summary": "JBEAP-27658", "url": "https://issues.redhat.com/browse/JBEAP-27658" }, { "category": "external", "summary": "JBEAP-27700", "url": "https://issues.redhat.com/browse/JBEAP-27700" }, { "category": "external", "summary": "JBEAP-27701", "url": "https://issues.redhat.com/browse/JBEAP-27701" }, { "category": "external", "summary": "JBEAP-27713", "url": "https://issues.redhat.com/browse/JBEAP-27713" }, { "category": "external", "summary": "JBEAP-27714", "url": "https://issues.redhat.com/browse/JBEAP-27714" }, { "category": "external", "summary": "JBEAP-27715", "url": "https://issues.redhat.com/browse/JBEAP-27715" }, { "category": "external", "summary": "JBEAP-27746", "url": "https://issues.redhat.com/browse/JBEAP-27746" }, { "category": "external", "summary": "JBEAP-27747", "url": "https://issues.redhat.com/browse/JBEAP-27747" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8076.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.19 Security update", "tracking": { "current_release_date": "2024-12-17T21:03:01+00:00", "generator": { "date": "2024-12-17T21:03:01+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2024:8076", "initial_release_date": "2024-10-14T18:01:49+00:00", "revision_history": [ { "date": "2024-10-14T18:01:49+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-10-14T18:01:49+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T21:03:01+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss EAP 7.4 for RHEL 8", "product": { "name": "Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" }, { "branches": [ { "category": "product_version", "name": "eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.src", "product": { "name": "eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.src", "product_id": "eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-xalan-j2@2.7.1-37.redhat_00015.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.src", "product": { "name": "eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.src", "product_id": "eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-hal-console@3.3.24-1.Final_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.src", "product": { "name": "eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.src", "product_id": "eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-undertow-jastow@2.0.15-1.Final_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.src", "product": { "name": "eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.src", "product_id": "eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jsoup@1.15.4-1.redhat_00003.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.src", "product": { "name": "eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.src", "product_id": "eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jbossws-cxf@5.4.12-1.Final_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.src", "product": { "name": "eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.src", "product_id": "eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar@1.5.18-1.Final_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "product": { "name": "eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "product_id": "eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-cert-helper@1.1.3-1.redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.src", "product": { "name": "eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.src", "product_id": "eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-hibernate-validator@6.0.23-2.SP1_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.src", "product": { "name": "eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.src", "product_id": "eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-ejb-client@4.0.55-1.Final_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "product": { "name": "eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "product_id": "eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-insights-java-client@1.1.3-1.redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.src", "product": { "name": "eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.src", "product_id": "eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration@1.10.0-39.Final_redhat_00039.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.src", "product": { "name": "eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.src", "product_id": "eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly@7.4.19-1.GA_redhat_00002.1.el8eap?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.noarch", "product": { "name": "eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.noarch", "product_id": "eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-xalan-j2@2.7.1-37.redhat_00015.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-hal-console@3.3.24-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-undertow-jastow@2.0.15-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.noarch", "product": { "name": "eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.noarch", "product_id": "eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jsoup@1.15.4-1.redhat_00003.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jbossws-cxf@5.4.12-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar@1.5.18-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-common-api@1.5.18-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-common-impl@1.5.18-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-common-spi@1.5.18-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-core-api@1.5.18-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-core-impl@1.5.18-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-deployers-common@1.5.18-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-jdbc@1.5.18-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-validator@1.5.18-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "product_id": "eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-hibernate-validator@6.0.23-2.SP1_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "product_id": "eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-hibernate-validator-cdi@6.0.23-2.SP1_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-ejb-client@4.0.55-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "product_id": "eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-insights-java-client@1.1.3-1.redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration@1.10.0-39.Final_redhat_00039.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-cli@1.10.0-39.Final_redhat_00039.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-core@1.10.0-39.Final_redhat_00039.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "product": { "name": "eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "product_id": "eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly@7.4.19-1.GA_redhat_00002.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "product": { "name": "eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "product_id": "eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk11@7.4.19-1.GA_redhat_00002.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "product": { "name": "eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "product_id": "eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk17@7.4.19-1.GA_redhat_00002.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "product": { "name": "eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "product_id": "eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk8@7.4.19-1.GA_redhat_00002.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "product": { "name": "eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "product_id": "eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-javadocs@7.4.19-1.GA_redhat_00002.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "product": { "name": "eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "product_id": "eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-modules@7.4.19-1.GA_redhat_00002.1.el8eap?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "product": { "name": "eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "product_id": "eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-cert-helper@1.1.3-1.redhat_00001.1.el8eap?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.src" }, "product_reference": "eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.src" }, "product_reference": "eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src" }, "product_reference": "eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.src" }, "product_reference": "eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src" }, "product_reference": "eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64 as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64" }, "product_reference": "eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "relates_to_product_reference": "8Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.src" }, "product_reference": "eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.src" }, "product_reference": "eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.src" }, "product_reference": "eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.noarch" }, "product_reference": "eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.src" }, "product_reference": "eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.src" }, "product_reference": "eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch" }, "product_reference": "eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.src" }, "product_reference": "eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch" }, "product_reference": "eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch" }, "product_reference": "eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch" }, "product_reference": "eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch" }, "product_reference": "eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch" }, "product_reference": "eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.noarch" }, "product_reference": "eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.4" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8", "product_id": "8Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.src" }, "product_reference": "eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.4" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108554" } ], "notes": [ { "category": "description", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.src", "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "RHBZ#2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-34169", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-14T18:01:49+00:00", "details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "8Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.src", "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8076" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "8Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.src", "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)" }, { "cve": "CVE-2022-36033", "cwe": { "id": "CWE-87", "name": "Improper Neutralization of Alternate XSS Syntax" }, "discovery_date": "2022-09-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2127078" } ], "notes": [ { "category": "description", "text": "A flaw was found in jsoup, a Java HTML parser built for HTML editing, cleaning, scraping, and Cross-site scripting (XSS) safety. An issue in jsoup may incorrectly sanitize HTML, including `javascript:` URL expressions, which could allow XSS attacks when a reader subsequently clicks that link. If the non-default `SafeList.preserveRelativeLinks` option is enabled, HTML, including `javascript:` URLs crafted with control characters, will not be sanitized. If the site that this HTML is published on does not set a Content Security Policy, an XSS attack is possible.", "title": "Vulnerability description" }, { "category": "summary", "text": "jsoup: The jsoup cleaner may incorrectly sanitize crafted XSS attempts if SafeList.preserveRelativeLinks is enabled", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.src", "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-36033" }, { "category": "external", "summary": "RHBZ#2127078", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2127078" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-36033", "url": "https://www.cve.org/CVERecord?id=CVE-2022-36033" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-36033", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-36033" } ], "release_date": "2022-08-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-14T18:01:49+00:00", "details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "8Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.src", "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8076" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "8Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.src", "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jsoup: The jsoup cleaner may incorrectly sanitize crafted XSS attempts if SafeList.preserveRelativeLinks is enabled" }, { "cve": "CVE-2023-51775", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2024-02-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2266921" } ], "notes": [ { "category": "description", "text": "A flaw was found in the jose.4.j (jose4j) library. The JWE key management algorithms based on PBKDF2 require a JOSE Header Parameter called p2c (PBES2 Count). This parameter dictates the number of PBKDF2 iterations needed to derive a CEK wrapping key. Its primary purpose is to intentionally slow down the key derivation function, making password brute-force and dictionary attacks more resource-intensive. However, if an attacker sets the p2c parameter in JWE to a large number, it can cause high computational consumption, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "jose4j: denial of service via specially crafted JWE", "title": "Vulnerability summary" }, { "category": "other", "text": "The vulnerability in the jose4j library, where the \"p2c\" parameter in PBKDF2-based JWE key management algorithms can be manipulated to induce high computational consumption, is classified as moderate severity due to its potential impact on service availability and resource exhaustion. By setting a large value for \"p2c\", an attacker can force the server to perform an excessive number of PBKDF2 iterations during key derivation. This results in increased CPU and memory usage, potentially leading to degraded performance or temporary denial of service.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.src", "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-51775" }, { "category": "external", "summary": "RHBZ#2266921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266921" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-51775", "url": "https://www.cve.org/CVERecord?id=CVE-2023-51775" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-51775", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-51775" } ], "release_date": "2024-02-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-14T18:01:49+00:00", "details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "8Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.src", "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8076" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.src", "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.src", "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jose4j: denial of service via specially crafted JWE" }, { "cve": "CVE-2024-4029", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2024-04-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2278615" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Wildfly\u2019s management interface. Due to the lack of limitation of sockets for the management interface, it may be possible to cause a denial of service hitting the nofile limit as there is no possibility to configure or set a maximum number of connections.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly: No timeout for EAP management interface may lead to Denial of Service (DoS)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat rates this as a Low impact since this requires high privileges to jeopardize the system. The management interface is normally internal/local only and not exposed externally.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.src", "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-4029" }, { "category": "external", "summary": "RHBZ#2278615", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278615" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-4029", "url": "https://www.cve.org/CVERecord?id=CVE-2024-4029" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-4029", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4029" } ], "release_date": "2024-05-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-14T18:01:49+00:00", "details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "8Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.src", "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8076" }, { "category": "workaround", "details": "Currently there is no available mitigation for this vulnerability. Please make sure to perform updates as they become available.", "product_ids": [ "8Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.src", "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.src", "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.src" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "wildfly: No timeout for EAP management interface may lead to Denial of Service (DoS)" }, { "cve": "CVE-2024-4068", "cwe": { "id": "CWE-1050", "name": "Excessive Platform Resource Consumption within a Loop" }, "discovery_date": "2024-05-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2280600" } ], "notes": [ { "category": "description", "text": "A flaw was found in the NPM package `braces.` It fails to limit the number of characters it can handle, which could lead to memory exhaustion. In `lib/parse.js,` if a malicious user sends \"imbalanced braces\" as input, the parsing will enter a loop, causing the program to start allocating heap memory without freeing it at any moment of the loop. Eventually, the JavaScript heap limit is reached, and the program will crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "braces: fails to limit the number of characters it can handle", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.src", "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-4068" }, { "category": "external", "summary": "RHBZ#2280600", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280600" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-4068", "url": "https://www.cve.org/CVERecord?id=CVE-2024-4068" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-4068", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4068" }, { "category": "external", "summary": "https://devhub.checkmarx.com/cve-details/CVE-2024-4068/", "url": "https://devhub.checkmarx.com/cve-details/CVE-2024-4068/" }, { "category": "external", "summary": "https://github.com/micromatch/braces/blob/98414f9f1fabe021736e26836d8306d5de747e0d/lib/parse.js#L308", "url": "https://github.com/micromatch/braces/blob/98414f9f1fabe021736e26836d8306d5de747e0d/lib/parse.js#L308" }, { "category": "external", "summary": "https://github.com/micromatch/braces/issues/35", "url": "https://github.com/micromatch/braces/issues/35" } ], "release_date": "2024-03-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-14T18:01:49+00:00", "details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "8Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.src", "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8076" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.src", "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-hal-console-0:3.3.24-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-hibernate-validator-0:6.0.23-2.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-hibernate-validator-cdi-0:6.0.23-2.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-insights-java-client-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.18-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.18-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el8eap.x86_64", "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.55-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-39.Final_redhat_00039.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-39.Final_redhat_00039.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.12-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-jsoup-0:1.15.4-1.redhat_00003.1.el8eap.src", "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.15-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.19-1.GA_redhat_00002.1.el8eap.src", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.19-1.GA_redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.noarch", "8Base-JBEAP-7.4:eap7-xalan-j2-0:2.7.1-37.redhat_00015.1.el8eap.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "braces: fails to limit the number of characters it can handle" } ] }
rhsa-2022_5684
Vulnerability from csaf_redhat
Published
2022-07-21 15:04
Modified
2024-11-26 03:08
Summary
Red Hat Security Advisory: java-11-openjdk security update
Notes
Topic
An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.
Security Fix(es):
* OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) (CVE-2022-34169)
* OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540)
* OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.\n\nSecurity Fix(es):\n\n* OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) (CVE-2022-34169)\n\n* OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540)\n\n* OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:5684", "url": "https://access.redhat.com/errata/RHSA-2022:5684" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5684.json" } ], "title": "Red Hat Security Advisory: java-11-openjdk security update", "tracking": { "current_release_date": "2024-11-26T03:08:34+00:00", "generator": { "date": "2024-11-26T03:08:34+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2022:5684", "initial_release_date": "2022-07-21T15:04:16+00:00", "revision_history": [ { "date": "2022-07-21T15:04:16+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-07-21T15:04:16+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-26T03:08:34+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:8.2::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_2.src", "product": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_2.src", "product_id": "java-11-openjdk-1:11.0.16.0.8-1.el8_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.16.0.8-1.el8_2?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_2.aarch64", "product": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_2.aarch64", "product_id": "java-11-openjdk-1:11.0.16.0.8-1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.16.0.8-1.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.aarch64", "product": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.aarch64", "product_id": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo@11.0.16.0.8-1.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.aarch64", "product": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.aarch64", "product_id": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel@11.0.16.0.8-1.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.aarch64", "product": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.aarch64", "product_id": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless@11.0.16.0.8-1.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.aarch64", "product": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.aarch64", "product_id": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc@11.0.16.0.8-1.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.aarch64", "product": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.aarch64", "product_id": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc-zip@11.0.16.0.8-1.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.aarch64", "product": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.aarch64", "product_id": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods@11.0.16.0.8-1.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.aarch64", "product": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.aarch64", "product_id": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src@11.0.16.0.8-1.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.aarch64", "product": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.aarch64", "product_id": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs@11.0.16.0.8-1.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.aarch64", "product": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.aarch64", "product_id": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debugsource@11.0.16.0.8-1.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "product": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "product_id": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debuginfo@11.0.16.0.8-1.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "product": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "product_id": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-debuginfo@11.0.16.0.8-1.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "product": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "product_id": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-slowdebug-debuginfo@11.0.16.0.8-1.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "product": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "product_id": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-debuginfo@11.0.16.0.8-1.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "product": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "product_id": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-slowdebug-debuginfo@11.0.16.0.8-1.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "product": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "product_id": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-slowdebug-debuginfo@11.0.16.0.8-1.el8_2?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_2.ppc64le", "product": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_2.ppc64le", "product_id": "java-11-openjdk-1:11.0.16.0.8-1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.16.0.8-1.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.ppc64le", "product": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.ppc64le", "product_id": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo@11.0.16.0.8-1.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.ppc64le", "product": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.ppc64le", "product_id": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel@11.0.16.0.8-1.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.ppc64le", "product": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.ppc64le", "product_id": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless@11.0.16.0.8-1.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.ppc64le", "product": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.ppc64le", "product_id": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc@11.0.16.0.8-1.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.ppc64le", "product": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.ppc64le", "product_id": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc-zip@11.0.16.0.8-1.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.ppc64le", "product": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.ppc64le", "product_id": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods@11.0.16.0.8-1.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.ppc64le", "product": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.ppc64le", "product_id": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src@11.0.16.0.8-1.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.ppc64le", "product": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.ppc64le", "product_id": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs@11.0.16.0.8-1.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.ppc64le", "product": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.ppc64le", "product_id": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debugsource@11.0.16.0.8-1.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "product": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "product_id": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debuginfo@11.0.16.0.8-1.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "product": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "product_id": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-debuginfo@11.0.16.0.8-1.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "product": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "product_id": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-slowdebug-debuginfo@11.0.16.0.8-1.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "product": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "product_id": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-debuginfo@11.0.16.0.8-1.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "product": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "product_id": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-slowdebug-debuginfo@11.0.16.0.8-1.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "product": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "product_id": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-slowdebug-debuginfo@11.0.16.0.8-1.el8_2?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_2.x86_64", "product": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_2.x86_64", "product_id": "java-11-openjdk-1:11.0.16.0.8-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.16.0.8-1.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.x86_64", "product": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.x86_64", "product_id": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo@11.0.16.0.8-1.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.x86_64", "product": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.x86_64", "product_id": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel@11.0.16.0.8-1.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.x86_64", "product": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.x86_64", "product_id": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless@11.0.16.0.8-1.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.x86_64", "product": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.x86_64", "product_id": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc@11.0.16.0.8-1.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.x86_64", "product": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.x86_64", "product_id": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc-zip@11.0.16.0.8-1.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.x86_64", "product": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.x86_64", "product_id": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods@11.0.16.0.8-1.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.x86_64", "product": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.x86_64", "product_id": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src@11.0.16.0.8-1.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.x86_64", "product": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.x86_64", "product_id": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs@11.0.16.0.8-1.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.x86_64", "product": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.x86_64", "product_id": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debugsource@11.0.16.0.8-1.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "product": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "product_id": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debuginfo@11.0.16.0.8-1.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "product": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "product_id": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-debuginfo@11.0.16.0.8-1.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "product": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "product_id": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-slowdebug-debuginfo@11.0.16.0.8-1.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "product": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "product_id": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-debuginfo@11.0.16.0.8-1.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "product": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "product_id": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-slowdebug-debuginfo@11.0.16.0.8-1.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "product": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "product_id": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-slowdebug-debuginfo@11.0.16.0.8-1.el8_2?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_2.s390x", "product": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_2.s390x", "product_id": "java-11-openjdk-1:11.0.16.0.8-1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.16.0.8-1.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.s390x", "product": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.s390x", "product_id": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo@11.0.16.0.8-1.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.s390x", "product": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.s390x", "product_id": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel@11.0.16.0.8-1.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.s390x", "product": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.s390x", "product_id": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless@11.0.16.0.8-1.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.s390x", "product": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.s390x", "product_id": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc@11.0.16.0.8-1.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.s390x", "product": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.s390x", "product_id": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc-zip@11.0.16.0.8-1.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.s390x", "product": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.s390x", "product_id": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods@11.0.16.0.8-1.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.s390x", "product": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.s390x", "product_id": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src@11.0.16.0.8-1.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.s390x", "product": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.s390x", "product_id": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs@11.0.16.0.8-1.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.s390x", "product": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.s390x", "product_id": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debugsource@11.0.16.0.8-1.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "product": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "product_id": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debuginfo@11.0.16.0.8-1.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "product": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "product_id": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-debuginfo@11.0.16.0.8-1.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "product": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "product_id": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-slowdebug-debuginfo@11.0.16.0.8-1.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "product": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "product_id": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-debuginfo@11.0.16.0.8-1.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "product": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "product_id": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-slowdebug-debuginfo@11.0.16.0.8-1.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "product": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "product_id": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-slowdebug-debuginfo@11.0.16.0.8-1.el8_2?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.aarch64" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.ppc64le" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.s390x" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_2.src as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.src" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el8_2.src", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.x86_64" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.s390x" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.aarch64" }, "product_reference": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.ppc64le" }, "product_reference": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.s390x" }, "product_reference": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.x86_64" }, "product_reference": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.aarch64" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.ppc64le" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.s390x" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.x86_64" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.aarch64" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.ppc64le" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.s390x" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.x86_64" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64" }, "product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le" }, "product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.s390x" }, "product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64" }, "product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64" }, "product_reference": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le" }, "product_reference": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x" }, "product_reference": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64" }, "product_reference": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.aarch64" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.ppc64le" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.s390x" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.x86_64" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64" }, "product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le" }, "product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.s390x" }, "product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64" }, "product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64" }, "product_reference": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le" }, "product_reference": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x" }, "product_reference": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64" }, "product_reference": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.aarch64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.s390x" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.x86_64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.aarch64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.s390x" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.x86_64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.aarch64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.ppc64le" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.s390x" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.x86_64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64" }, "product_reference": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le" }, "product_reference": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x" }, "product_reference": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64" }, "product_reference": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.aarch64" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.ppc64le" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.s390x" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.x86_64" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.aarch64" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.ppc64le" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.s390x" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.x86_64" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21540", "cwe": { "id": "CWE-402", "name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108540" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: class compilation issue (Hotspot, 8281859)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.src", "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21540" }, { "category": "external", "summary": "RHBZ#2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21540", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21540" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-21T15:04:16+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.src", "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5684" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.src", "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: class compilation issue (Hotspot, 8281859)" }, { "cve": "CVE-2022-21541", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108543" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.src", "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21541" }, { "category": "external", "summary": "RHBZ#2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21541", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21541" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-21T15:04:16+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.src", "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5684" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.src", "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)" }, { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108554" } ], "notes": [ { "category": "description", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.src", "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "RHBZ#2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-34169", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-21T15:04:16+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.src", "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5684" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.src", "AppStream-8.2.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)" } ] }
rhsa-2022_5681
Vulnerability from csaf_redhat
Published
2022-07-21 15:31
Modified
2024-11-26 03:08
Summary
Red Hat Security Advisory: java-11-openjdk security and bug fix update
Notes
Topic
An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8.4 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.
Security Fix(es):
* OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) (CVE-2022-34169)
* OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540)
* OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* rh1991003 patch breaks sun.security.pkcs11.wrapper.PKCS11.getInstance() [rhel-8, openjdk-11] (BZ#2099918)
* Revert to disabling system security properties and FIPS mode support together [rhel-8, openjdk-11] (BZ#2108249)
* SecretKey generate/import operations don't add the CKA_SIGN attribute in FIPS mode [rhel-8, openjdk-11] (BZ#2108252)
* Detect NSS at Runtime for FIPS detection [rhel-8, openjdk-17] (BZ#2108269)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.\n\nSecurity Fix(es):\n\n* OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) (CVE-2022-34169)\n\n* OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540)\n\n* OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* rh1991003 patch breaks sun.security.pkcs11.wrapper.PKCS11.getInstance() [rhel-8, openjdk-11] (BZ#2099918)\n\n* Revert to disabling system security properties and FIPS mode support together [rhel-8, openjdk-11] (BZ#2108249)\n\n* SecretKey generate/import operations don\u0027t add the CKA_SIGN attribute in FIPS mode [rhel-8, openjdk-11] (BZ#2108252)\n\n* Detect NSS at Runtime for FIPS detection [rhel-8, openjdk-17] (BZ#2108269)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:5681", "url": "https://access.redhat.com/errata/RHSA-2022:5681" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2099918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099918" }, { "category": "external", "summary": "2108249", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108249" }, { "category": "external", "summary": "2108252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108252" }, { "category": "external", "summary": "2108269", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108269" }, { "category": "external", "summary": "2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5681.json" } ], "title": "Red Hat Security Advisory: java-11-openjdk security and bug fix update", "tracking": { "current_release_date": "2024-11-26T03:08:50+00:00", "generator": { "date": "2024-11-26T03:08:50+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2022:5681", "initial_release_date": "2022-07-21T15:31:09+00:00", "revision_history": [ { "date": "2022-07-21T15:31:09+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-07-21T15:31:09+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-26T03:08:50+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:8.4::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux CRB EUS (v.8.4)", "product": { "name": "Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:8.4::crb" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_4.src", "product": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_4.src", "product_id": "java-11-openjdk-1:11.0.16.0.8-1.el8_4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.16.0.8-1.el8_4?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_4.aarch64", "product": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_4.aarch64", "product_id": "java-11-openjdk-1:11.0.16.0.8-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.16.0.8-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.aarch64", "product": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.aarch64", "product_id": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo@11.0.16.0.8-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.aarch64", "product": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.aarch64", "product_id": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel@11.0.16.0.8-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.aarch64", "product": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.aarch64", "product_id": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless@11.0.16.0.8-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.aarch64", "product": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.aarch64", "product_id": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc@11.0.16.0.8-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.aarch64", "product": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.aarch64", "product_id": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc-zip@11.0.16.0.8-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.aarch64", "product": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.aarch64", "product_id": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods@11.0.16.0.8-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.aarch64", "product": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.aarch64", "product_id": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src@11.0.16.0.8-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.aarch64", "product": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.aarch64", "product_id": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs@11.0.16.0.8-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.aarch64", "product": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.aarch64", "product_id": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debugsource@11.0.16.0.8-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "product": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "product_id": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debuginfo@11.0.16.0.8-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "product": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "product_id": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-debuginfo@11.0.16.0.8-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "product": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "product_id": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-slowdebug-debuginfo@11.0.16.0.8-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "product": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "product_id": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-debuginfo@11.0.16.0.8-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "product": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "product_id": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-slowdebug-debuginfo@11.0.16.0.8-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "product": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "product_id": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-slowdebug-debuginfo@11.0.16.0.8-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "product": { "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "product_id": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo-slowdebug@11.0.16.0.8-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "product": { "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "product_id": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-slowdebug@11.0.16.0.8-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "product": { "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "product_id": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-slowdebug@11.0.16.0.8-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "product": { "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "product_id": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods-slowdebug@11.0.16.0.8-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "product": { "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "product_id": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-slowdebug@11.0.16.0.8-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "product": { "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "product_id": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src-slowdebug@11.0.16.0.8-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "product": { "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "product_id": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs-slowdebug@11.0.16.0.8-1.el8_4?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_4.ppc64le", "product": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_4.ppc64le", "product_id": "java-11-openjdk-1:11.0.16.0.8-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.16.0.8-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.ppc64le", "product": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.ppc64le", "product_id": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo@11.0.16.0.8-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.ppc64le", "product": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.ppc64le", "product_id": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel@11.0.16.0.8-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.ppc64le", "product": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.ppc64le", "product_id": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless@11.0.16.0.8-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.ppc64le", "product": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.ppc64le", "product_id": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc@11.0.16.0.8-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.ppc64le", "product": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.ppc64le", "product_id": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc-zip@11.0.16.0.8-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.ppc64le", "product": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.ppc64le", "product_id": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods@11.0.16.0.8-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.ppc64le", "product": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.ppc64le", "product_id": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src@11.0.16.0.8-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.ppc64le", "product": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.ppc64le", "product_id": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs@11.0.16.0.8-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.ppc64le", "product": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.ppc64le", "product_id": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debugsource@11.0.16.0.8-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "product": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "product_id": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debuginfo@11.0.16.0.8-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "product": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "product_id": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-debuginfo@11.0.16.0.8-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "product": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "product_id": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-slowdebug-debuginfo@11.0.16.0.8-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "product": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "product_id": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-debuginfo@11.0.16.0.8-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "product": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "product_id": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-slowdebug-debuginfo@11.0.16.0.8-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "product": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "product_id": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-slowdebug-debuginfo@11.0.16.0.8-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "product": { "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "product_id": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo-slowdebug@11.0.16.0.8-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "product": { "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "product_id": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-slowdebug@11.0.16.0.8-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "product": { "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "product_id": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-slowdebug@11.0.16.0.8-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "product": { "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "product_id": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods-slowdebug@11.0.16.0.8-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "product": { "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "product_id": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-slowdebug@11.0.16.0.8-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "product": { "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "product_id": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src-slowdebug@11.0.16.0.8-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "product": { "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "product_id": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs-slowdebug@11.0.16.0.8-1.el8_4?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_4.x86_64", "product": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_4.x86_64", "product_id": "java-11-openjdk-1:11.0.16.0.8-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.16.0.8-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.x86_64", "product": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.x86_64", "product_id": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo@11.0.16.0.8-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.x86_64", "product": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.x86_64", "product_id": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel@11.0.16.0.8-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.x86_64", "product": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.x86_64", "product_id": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless@11.0.16.0.8-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.x86_64", "product": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.x86_64", "product_id": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc@11.0.16.0.8-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.x86_64", "product": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.x86_64", "product_id": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc-zip@11.0.16.0.8-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.x86_64", "product": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.x86_64", "product_id": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods@11.0.16.0.8-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.x86_64", "product": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.x86_64", "product_id": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src@11.0.16.0.8-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.x86_64", "product": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.x86_64", "product_id": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs@11.0.16.0.8-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.x86_64", "product": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.x86_64", "product_id": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debugsource@11.0.16.0.8-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "product": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "product_id": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debuginfo@11.0.16.0.8-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "product": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "product_id": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-debuginfo@11.0.16.0.8-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "product": { "name": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "product_id": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-fastdebug-debuginfo@11.0.16.0.8-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "product": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "product_id": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-slowdebug-debuginfo@11.0.16.0.8-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "product": { "name": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "product_id": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-fastdebug-debuginfo@11.0.16.0.8-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "product": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "product_id": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-debuginfo@11.0.16.0.8-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "product": { "name": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "product_id": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-fastdebug-debuginfo@11.0.16.0.8-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "product": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "product_id": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-slowdebug-debuginfo@11.0.16.0.8-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "product": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "product_id": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-slowdebug-debuginfo@11.0.16.0.8-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product": { "name": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product_id": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo-fastdebug@11.0.16.0.8-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product": { "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product_id": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo-slowdebug@11.0.16.0.8-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product": { "name": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product_id": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-fastdebug@11.0.16.0.8-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product": { "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product_id": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-slowdebug@11.0.16.0.8-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product": { "name": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product_id": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-fastdebug@11.0.16.0.8-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product": { "name": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product_id": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-fastdebug@11.0.16.0.8-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product": { "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product_id": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-slowdebug@11.0.16.0.8-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product": { "name": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product_id": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods-fastdebug@11.0.16.0.8-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product": { "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product_id": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods-slowdebug@11.0.16.0.8-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product": { "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product_id": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-slowdebug@11.0.16.0.8-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product": { "name": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product_id": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src-fastdebug@11.0.16.0.8-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product": { "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product_id": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src-slowdebug@11.0.16.0.8-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product": { "name": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product_id": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs-fastdebug@11.0.16.0.8-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product": { "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product_id": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs-slowdebug@11.0.16.0.8-1.el8_4?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_4.s390x", "product": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_4.s390x", "product_id": "java-11-openjdk-1:11.0.16.0.8-1.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk@11.0.16.0.8-1.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.s390x", "product": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.s390x", "product_id": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo@11.0.16.0.8-1.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.s390x", "product": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.s390x", "product_id": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel@11.0.16.0.8-1.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.s390x", "product": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.s390x", "product_id": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless@11.0.16.0.8-1.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.s390x", "product": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.s390x", "product_id": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc@11.0.16.0.8-1.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.s390x", "product": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.s390x", "product_id": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-javadoc-zip@11.0.16.0.8-1.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.s390x", "product": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.s390x", "product_id": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods@11.0.16.0.8-1.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.s390x", "product": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.s390x", "product_id": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src@11.0.16.0.8-1.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.s390x", "product": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.s390x", "product_id": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs@11.0.16.0.8-1.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.s390x", "product": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.s390x", "product_id": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debugsource@11.0.16.0.8-1.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "product": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "product_id": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-debuginfo@11.0.16.0.8-1.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "product": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "product_id": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-debuginfo@11.0.16.0.8-1.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "product": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "product_id": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-slowdebug-debuginfo@11.0.16.0.8-1.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "product": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "product_id": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-debuginfo@11.0.16.0.8-1.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "product": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "product_id": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-slowdebug-debuginfo@11.0.16.0.8-1.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "product": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "product_id": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-slowdebug-debuginfo@11.0.16.0.8-1.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "product": { "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "product_id": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-demo-slowdebug@11.0.16.0.8-1.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "product": { "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "product_id": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-devel-slowdebug@11.0.16.0.8-1.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "product": { "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "product_id": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-headless-slowdebug@11.0.16.0.8-1.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "product": { "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "product_id": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-jmods-slowdebug@11.0.16.0.8-1.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "product": { "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "product_id": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-slowdebug@11.0.16.0.8-1.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "product": { "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "product_id": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-src-slowdebug@11.0.16.0.8-1.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "product": { "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "product_id": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-11-openjdk-static-libs-slowdebug@11.0.16.0.8-1.el8_4?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_4.src as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.src" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el8_4.src", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_4.src as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.src" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el8_4.src", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64" }, "product_reference": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le" }, "product_reference": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.s390x" }, "product_reference": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64" }, "product_reference": "java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21540", "cwe": { "id": "CWE-402", "name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108540" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: class compilation issue (Hotspot, 8281859)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.src", "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.src", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21540" }, { "category": "external", "summary": "RHBZ#2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21540", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21540" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-21T15:31:09+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.src", "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.src", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5681" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.src", "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.src", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: class compilation issue (Hotspot, 8281859)" }, { "cve": "CVE-2022-21541", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108543" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.src", "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.src", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21541" }, { "category": "external", "summary": "RHBZ#2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21541", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21541" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-21T15:31:09+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.src", "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.src", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5681" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.src", "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.src", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)" }, { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108554" } ], "notes": [ { "category": "description", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.src", "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.src", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "RHBZ#2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-34169", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-21T15:31:09+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.src", "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.src", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5681" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.src", "AppStream-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.src", "CRB-8.4.0.Z.EUS:java-11-openjdk-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-debugsource-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-demo-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-devel-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-fastdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-headless-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-javadoc-zip-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-jmods-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-slowdebug-debuginfo-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-src-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-fastdebug-1:11.0.16.0.8-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-11-openjdk-static-libs-slowdebug-1:11.0.16.0.8-1.el8_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)" } ] }
rhsa-2022_5753
Vulnerability from csaf_redhat
Published
2022-07-28 15:32
Modified
2024-11-26 03:09
Summary
Red Hat Security Advisory: OpenJDK 8u342 Windows builds release and security update
Notes
Topic
The Red Hat build of OpenJDK 8 (java-1.8.0-openjdk) is now available for Windows.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The OpenJDK 8 packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.
This release of the Red Hat build of OpenJDK 8 (8u342) for Windows serves as a replacement for the Red Hat build of OpenJDK 8 (8u332) and includes security and bug fixes, and enhancements. For further information, refer to the release notes linked to in the References section.
Security Fix(es):
* OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540)
* OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541)
* OpenJDK: integer truncation issue in Xalan (JAXP, 8285407) (CVE-2022-34169)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgements, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "The Red Hat build of OpenJDK 8 (java-1.8.0-openjdk) is now available for Windows.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The OpenJDK 8 packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.\n\nThis release of the Red Hat build of OpenJDK 8 (8u342) for Windows serves as a replacement for the Red Hat build of OpenJDK 8 (8u332) and includes security and bug fixes, and enhancements. For further information, refer to the release notes linked to in the References section.\n\nSecurity Fix(es):\n* OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540)\n\n* OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541)\n\n* OpenJDK: integer truncation issue in Xalan (JAXP, 8285407) (CVE-2022-34169)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgements, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:5753", "url": "https://access.redhat.com/errata/RHSA-2022:5753" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5753.json" } ], "title": "Red Hat Security Advisory: OpenJDK 8u342 Windows builds release and security update", "tracking": { "current_release_date": "2024-11-26T03:09:13+00:00", "generator": { "date": "2024-11-26T03:09:13+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2022:5753", "initial_release_date": "2022-07-28T15:32:23+00:00", "revision_history": [ { "date": "2022-07-28T15:32:23+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-07-28T15:32:23+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-26T03:09:13+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Build of OpenJDK 8u342", "product": { "name": "Red Hat Build of OpenJDK 8u342", "product_id": "Red Hat Build of OpenJDK 8u342", "product_identification_helper": { "cpe": "cpe:/a:redhat:openjdk:1.8::windows" } } } ], "category": "product_family", "name": "OpenJDK" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21540", "cwe": { "id": "CWE-402", "name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108540" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: class compilation issue (Hotspot, 8281859)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Build of OpenJDK 8u342" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21540" }, { "category": "external", "summary": "RHBZ#2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21540", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21540" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-28T15:32:23+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/openjdk/8/html/installing_and_using_openjdk_8_for_windows/index", "product_ids": [ "Red Hat Build of OpenJDK 8u342" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5753" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "Red Hat Build of OpenJDK 8u342" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: class compilation issue (Hotspot, 8281859)" }, { "cve": "CVE-2022-21541", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108543" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Build of OpenJDK 8u342" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21541" }, { "category": "external", "summary": "RHBZ#2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21541", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21541" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-28T15:32:23+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/openjdk/8/html/installing_and_using_openjdk_8_for_windows/index", "product_ids": [ "Red Hat Build of OpenJDK 8u342" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5753" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat Build of OpenJDK 8u342" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)" }, { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108554" } ], "notes": [ { "category": "description", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Build of OpenJDK 8u342" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "RHBZ#2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-34169", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-28T15:32:23+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/openjdk/8/html/installing_and_using_openjdk_8_for_windows/index", "product_ids": [ "Red Hat Build of OpenJDK 8u342" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5753" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat Build of OpenJDK 8u342" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)" } ] }
rhsa-2024_8824
Vulnerability from csaf_redhat
Published
2024-11-04 20:13
Modified
2024-12-13 14:15
Summary
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.0.4 Security update
Notes
Topic
A security update is now available for Red Hat JBoss Enterprise Application Platform 8.0 for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat JBoss Enterprise Application Platform 8 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 8.0.4 serves as a replacement for Red Hat JBoss Enterprise Application Platform 8.0.3, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 8.0.4 Release Notes for information about the most significant bug fixes and enhancements included in this release.
Security Fix(es):
* org.apache.cxf/cxf-rt-transports-http: unrestricted memory consumption in CXF HTTP clients [eap-8.0.z] (CVE-2024-41172)
* com.nimbusds/nimbus-jose-jwt: large JWE p2c header value causes Denial of Service [eap-8.0.z] (CVE-2023-52428)
* wildfly-domain-http: wildfly: No timeout for EAP management interface may lead to Denial of Service (DoS) [eap-8.0.z] (CVE-2024-4029)
* xalan: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) [eap-8.0.z] (CVE-2022-34169)
* org.keycloak/keycloak-services: Vulnerable Redirect URI Validation Results in Open Redirec [eap-8.0.z] (CVE-2024-8883)
* org.keycloak/keycloak-saml-core-public: Improper Verification of SAML Responses Leading to Privilege Escalation in Keycloak [eap-8.0.z] (CVE-2024-8698)
* org.keycloak/keycloak-saml-core: Improper Verification of SAML Responses Leading to Privilege Escalation in Keycloak [eap-8.0.z] (CVE-2024-8698)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "A security update is now available for Red Hat JBoss Enterprise Application Platform 8.0 for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Enterprise Application Platform 8 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 8.0.4 serves as a replacement for Red Hat JBoss Enterprise Application Platform 8.0.3, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 8.0.4 Release Notes for information about the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* org.apache.cxf/cxf-rt-transports-http: unrestricted memory consumption in CXF HTTP clients [eap-8.0.z] (CVE-2024-41172)\n\n* com.nimbusds/nimbus-jose-jwt: large JWE p2c header value causes Denial of Service [eap-8.0.z] (CVE-2023-52428)\n\n* wildfly-domain-http: wildfly: No timeout for EAP management interface may lead to Denial of Service (DoS) [eap-8.0.z] (CVE-2024-4029)\n\n* xalan: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) [eap-8.0.z] (CVE-2022-34169)\n\n* org.keycloak/keycloak-services: Vulnerable Redirect URI Validation Results in Open Redirec [eap-8.0.z] (CVE-2024-8883)\n\n* org.keycloak/keycloak-saml-core-public: Improper Verification of SAML Responses Leading to Privilege Escalation in Keycloak [eap-8.0.z] (CVE-2024-8698)\n\n* org.keycloak/keycloak-saml-core: Improper Verification of SAML Responses Leading to Privilege Escalation in Keycloak [eap-8.0.z] (CVE-2024-8698)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:8824", "url": "https://access.redhat.com/errata/RHSA-2024:8824" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/8.0/", "url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/8.0/" }, { "category": "external", "summary": "2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "2278615", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278615" }, { "category": "external", "summary": "2298829", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2298829" }, { "category": "external", "summary": "2309764", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309764" }, { "category": "external", "summary": "2311641", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2311641" }, { "category": "external", "summary": "2312511", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2312511" }, { "category": "external", "summary": "JBEAP-24945", "url": "https://issues.redhat.com/browse/JBEAP-24945" }, { "category": "external", "summary": "JBEAP-25035", "url": "https://issues.redhat.com/browse/JBEAP-25035" }, { "category": "external", "summary": "JBEAP-27002", "url": "https://issues.redhat.com/browse/JBEAP-27002" }, { "category": "external", "summary": "JBEAP-27194", "url": "https://issues.redhat.com/browse/JBEAP-27194" }, { "category": "external", "summary": "JBEAP-27248", "url": "https://issues.redhat.com/browse/JBEAP-27248" }, { "category": "external", "summary": "JBEAP-27276", "url": "https://issues.redhat.com/browse/JBEAP-27276" }, { "category": "external", "summary": "JBEAP-27293", "url": "https://issues.redhat.com/browse/JBEAP-27293" }, { "category": "external", "summary": "JBEAP-27392", "url": "https://issues.redhat.com/browse/JBEAP-27392" }, { "category": "external", "summary": "JBEAP-27543", "url": "https://issues.redhat.com/browse/JBEAP-27543" }, { "category": "external", "summary": "JBEAP-27585", "url": "https://issues.redhat.com/browse/JBEAP-27585" }, { "category": "external", "summary": "JBEAP-27643", "url": "https://issues.redhat.com/browse/JBEAP-27643" }, { "category": "external", "summary": "JBEAP-27659", "url": "https://issues.redhat.com/browse/JBEAP-27659" }, { "category": "external", "summary": "JBEAP-27688", "url": "https://issues.redhat.com/browse/JBEAP-27688" }, { "category": "external", "summary": "JBEAP-27694", "url": "https://issues.redhat.com/browse/JBEAP-27694" }, { "category": "external", "summary": "JBEAP-27957", "url": "https://issues.redhat.com/browse/JBEAP-27957" }, { "category": "external", "summary": "JBEAP-28057", "url": "https://issues.redhat.com/browse/JBEAP-28057" }, { "category": "external", "summary": "JBEAP-28278", "url": "https://issues.redhat.com/browse/JBEAP-28278" }, { "category": "external", "summary": "JBEAP-28289", "url": "https://issues.redhat.com/browse/JBEAP-28289" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8824.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.0.4 Security update", "tracking": { "current_release_date": "2024-12-13T14:15:19+00:00", "generator": { "date": "2024-12-13T14:15:19+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2024:8824", "initial_release_date": "2024-11-04T20:13:24+00:00", "revision_history": [ { "date": "2024-11-04T20:13:24+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-11-04T20:13:24+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-13T14:15:19+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss EAP 8.0 for RHEL 9", "product": { "name": "Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" }, { "branches": [ { "category": "product_version", "name": "eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.src", "product": { "name": "eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.src", "product_id": "eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-pem-keystore@2.3.0-1.redhat_00001.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "product": { "name": "eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "product_id": "eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-jboss-cert-helper@1.1.3-1.redhat_00001.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.src", "product": { "name": "eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.src", "product_id": "eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-hibernate@6.2.31-1.Final_redhat_00002.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.src", "product": { "name": "eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.src", "product_id": "eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-jboss-logging@3.5.3-1.Final_redhat_00001.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.src", "product": { "name": "eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.src", "product_id": "eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-apache-commons-io@2.15.1-1.redhat_00001.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.src", "product": { "name": "eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.src", "product_id": "eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-snakeyaml@2.2.0-1.redhat_00001.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.src", "product": { "name": "eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.src", "product_id": "eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-objectweb-asm@9.6.0-1.redhat_00002.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "product": { "name": "eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "product_id": "eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-artemis-native@2.0.0-2.redhat_00005.1.el9eap?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "product": { "name": "eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "product_id": "eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-insights-java-client@1.1.3-1.redhat_00001.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.src", "product": { "name": "eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.src", "product_id": "eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-aesh-extensions@1.8.0-2.redhat_00001.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.src", "product": { "name": "eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.src", "product_id": "eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-nimbus-jose-jwt@9.37.3-1.redhat_00001.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.src", "product": { "name": "eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.src", "product_id": "eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-aesh-readline@2.2.0-2.redhat_00001.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.src", "product": { "name": "eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.src", "product_id": "eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-jctools@4.0.2-1.redhat_00001.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.src", "product": { "name": "eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.src", "product_id": "eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-fastinfoset@2.1.0-4.redhat_00001.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.src", "product": { "name": "eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.src", "product_id": "eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-resteasy-spring@3.0.1-2.Final_redhat_00001.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.src", "product": { "name": "eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.src", "product_id": "eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-apache-cxf@4.0.5-1.redhat_00001.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "product": { "name": "eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "product_id": "eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-activemq-artemis-native@2.0.0-2.redhat_00005.1.el9eap?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.src", "product": { "name": "eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.src", "product_id": "eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-activemq-artemis@2.33.0-1.redhat_00015.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.src", "product": { "name": "eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.src", "product_id": "eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-eap-product-conf-parent@800.4.0-1.GA_redhat_00001.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.src", "product": { "name": "eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.src", "product_id": "eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-jakarta-servlet-jsp-jstl-api@3.0.1-1.redhat_00001.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.src", "product": { "name": "eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.src", "product_id": "eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-narayana@6.0.3-1.Final_redhat_00001.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.src", "product": { "name": "eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.src", "product_id": "eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-jgroups@5.3.10-1.Final_redhat_00001.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.src", "product": { "name": "eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.src", "product_id": "eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-apache-commons-codec@1.16.1-2.redhat_00007.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.src", "product": { "name": "eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.src", "product_id": "eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-saaj-impl@3.0.4-1.redhat_00001.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.src", "product": { "name": "eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.src", "product_id": "eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-slf4j@2.0.16-1.redhat_00001.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.src", "product": { "name": "eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.src", "product_id": "eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-apache-commons-lang@3.14.0-2.redhat_00006.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.src", "product": { "name": "eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.src", "product_id": "eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-log4j@2.22.1-1.redhat_00002.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.src", "product": { "name": "eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.src", "product_id": "eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-artemis-wildfly-integration@2.0.1-1.redhat_00002.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.src", "product": { "name": "eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.src", "product_id": "eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-asyncutil@0.1.0-2.redhat_00010.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.src", "product": { "name": "eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.src", "product_id": "eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-apache-commons-collections@3.2.2-28.redhat_2.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.src", "product": { "name": "eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.src", "product_id": "eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-hppc@0.8.1-2.redhat_00001.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.src", "product": { "name": "eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.src", "product_id": "eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-aws-java-sdk@1.12.284-2.redhat_00002.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.src", "product": { "name": "eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.src", "product_id": "eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-resteasy-extensions@2.0.1-3.Final_redhat_00001.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.src", "product": { "name": "eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.src", "product_id": "eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-cryptacular@1.2.5-2.redhat_00001.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.src", "product": { "name": "eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.src", "product_id": "eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-hibernate-validator@8.0.1-3.Final_redhat_00001.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.src", "product": { "name": "eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.src", "product_id": "eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-shibboleth-java-support@8.0.0-6.redhat_00001.1.el9eap?arch=src" } } }, { "category": "product_version", "name": "eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.src", "product": { "name": "eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.src", "product_id": "eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-wildfly@8.0.4-2.GA_redhat_00005.1.el9eap?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.noarch", "product_id": "eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-pem-keystore@2.3.0-1.redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "product": { "name": "eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "product_id": "eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-hibernate@6.2.31-1.Final_redhat_00002.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "product": { "name": "eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "product_id": "eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-hibernate-core@6.2.31-1.Final_redhat_00002.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "product": { "name": "eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "product_id": "eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-hibernate-envers@6.2.31-1.Final_redhat_00002.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.noarch", "product_id": "eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-jboss-logging@3.5.3-1.Final_redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.noarch", "product_id": "eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-apache-commons-io@2.15.1-1.redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.noarch", "product_id": "eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-snakeyaml@2.2.0-1.redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "product": { "name": "eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "product_id": "eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-objectweb-asm@9.6.0-1.redhat_00002.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "product": { "name": "eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "product_id": "eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-objectweb-asm-util@9.6.0-1.redhat_00002.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "product_id": "eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-insights-java-client@1.1.3-1.redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.noarch", "product_id": "eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-aesh-extensions@1.8.0-2.redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.noarch", "product_id": "eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-nimbus-jose-jwt@9.37.3-1.redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.noarch", "product_id": "eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-aesh-readline@2.2.0-2.redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "product_id": "eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-jctools@4.0.2-1.redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "product_id": "eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-jctools-core@4.0.2-1.redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.noarch", "product_id": "eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-fastinfoset@2.1.0-4.redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.noarch", "product_id": "eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-resteasy-spring@3.0.1-2.Final_redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "product_id": "eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-apache-cxf@4.0.5-1.redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "product_id": "eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-apache-cxf-rt@4.0.5-1.redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "product_id": "eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-apache-cxf-services@4.0.5-1.redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "product_id": "eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-apache-cxf-tools@4.0.5-1.redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.noarch", "product": { "name": "eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.noarch", "product_id": "eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-activemq-artemis-native@2.0.0-2.redhat_00005.1.el9eap?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product": { "name": "eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product_id": "eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-activemq-artemis@2.33.0-1.redhat_00015.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product": { "name": "eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product_id": "eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-activemq-artemis-cli@2.33.0-1.redhat_00015.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product": { "name": "eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product_id": "eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-activemq-artemis-commons@2.33.0-1.redhat_00015.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product": { "name": "eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product_id": "eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-activemq-artemis-core-client@2.33.0-1.redhat_00015.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product": { "name": "eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product_id": "eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-activemq-artemis-dto@2.33.0-1.redhat_00015.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product": { "name": "eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product_id": "eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-activemq-artemis-hornetq-protocol@2.33.0-1.redhat_00015.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product": { "name": "eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product_id": "eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-activemq-artemis-hqclient-protocol@2.33.0-1.redhat_00015.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product": { "name": "eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product_id": "eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-activemq-artemis-jakarta-client@2.33.0-1.redhat_00015.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product": { "name": "eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product_id": "eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-activemq-artemis-jakarta-ra@2.33.0-1.redhat_00015.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product": { "name": "eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product_id": "eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-activemq-artemis-jakarta-server@2.33.0-1.redhat_00015.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product": { "name": "eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product_id": "eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-activemq-artemis-jakarta-service-extensions@2.33.0-1.redhat_00015.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product": { "name": "eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product_id": "eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-activemq-artemis-jdbc-store@2.33.0-1.redhat_00015.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product": { "name": "eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product_id": "eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-activemq-artemis-journal@2.33.0-1.redhat_00015.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product": { "name": "eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product_id": "eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-activemq-artemis-selector@2.33.0-1.redhat_00015.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product": { "name": "eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product_id": "eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-activemq-artemis-server@2.33.0-1.redhat_00015.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "product_id": "eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-eap-product-conf-parent@800.4.0-1.GA_redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "product_id": "eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-eap-product-conf-wildfly-ee-feature-pack@800.4.0-1.GA_redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "product_id": "eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-jakarta-servlet-jsp-jstl@3.0.1-1.redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "product_id": "eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-jakarta-servlet-jsp-jstl-api@3.0.1-1.redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "product_id": "eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-narayana@6.0.3-1.Final_redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "product_id": "eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-narayana-jbosstxbridge@6.0.3-1.Final_redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "product_id": "eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-narayana-jbossxts@6.0.3-1.Final_redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "product_id": "eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-narayana-jts-idlj@6.0.3-1.Final_redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "product_id": "eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-narayana-jts-integration@6.0.3-1.Final_redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "product_id": "eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-narayana-restat-api@6.0.3-1.Final_redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "product_id": "eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-narayana-restat-bridge@6.0.3-1.Final_redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "product_id": "eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-narayana-restat-integration@6.0.3-1.Final_redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "product_id": "eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-narayana-restat-util@6.0.3-1.Final_redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.noarch", "product_id": "eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-jgroups@5.3.10-1.Final_redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.noarch", "product": { "name": "eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.noarch", "product_id": "eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-apache-commons-codec@1.16.1-2.redhat_00007.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.noarch", "product_id": "eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-saaj-impl@3.0.4-1.redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "product_id": "eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-slf4j@2.0.16-1.redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "product_id": "eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-slf4j-api@2.0.16-1.redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.noarch", "product": { "name": "eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.noarch", "product_id": "eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-apache-commons-lang@3.14.0-2.redhat_00006.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.noarch", "product": { "name": "eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.noarch", "product_id": "eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-log4j@2.22.1-1.redhat_00002.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.noarch", "product": { "name": "eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.noarch", "product_id": "eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-artemis-wildfly-integration@2.0.1-1.redhat_00002.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.noarch", "product": { "name": "eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.noarch", "product_id": "eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-asyncutil@0.1.0-2.redhat_00010.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.noarch", "product": { "name": "eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.noarch", "product_id": "eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-apache-commons-collections@3.2.2-28.redhat_2.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.noarch", "product_id": "eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-hppc@0.8.1-2.redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "product": { "name": "eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "product_id": "eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-aws-java-sdk@1.12.284-2.redhat_00002.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "product": { "name": "eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "product_id": "eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-aws-java-sdk-core@1.12.284-2.redhat_00002.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "product": { "name": "eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "product_id": "eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-aws-java-sdk-kms@1.12.284-2.redhat_00002.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "product": { "name": "eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "product_id": "eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-aws-java-sdk-s3@1.12.284-2.redhat_00002.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "product": { "name": "eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "product_id": "eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-jmespath-java@1.12.284-2.redhat_00002.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "product_id": "eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-resteasy-extensions@2.0.1-3.Final_redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "product_id": "eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-resteasy-tracing-api@2.0.1-3.Final_redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.noarch", "product_id": "eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-cryptacular@1.2.5-2.redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "product_id": "eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-hibernate-validator@8.0.1-3.Final_redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "product_id": "eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-hibernate-validator-cdi@8.0.1-3.Final_redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.noarch", "product": { "name": "eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.noarch", "product_id": "eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-shibboleth-java-support@8.0.0-6.redhat_00001.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "product": { "name": "eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "product_id": "eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-wildfly@8.0.4-2.GA_redhat_00005.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "product": { "name": "eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "product_id": "eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-wildfly-java-jdk11@8.0.4-2.GA_redhat_00005.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "product": { "name": "eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "product_id": "eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-wildfly-java-jdk17@8.0.4-2.GA_redhat_00005.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "product": { "name": "eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "product_id": "eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-wildfly-java-jdk21@8.0.4-2.GA_redhat_00005.1.el9eap?arch=noarch" } } }, { "category": "product_version", "name": "eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "product": { "name": "eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "product_id": "eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-wildfly-modules@8.0.4-2.GA_redhat_00005.1.el9eap?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "product": { "name": "eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "product_id": "eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-jboss-cert-helper@1.1.3-1.redhat_00001.1.el9eap?arch=x86_64" } } }, { "category": "product_version", "name": "eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "product": { "name": "eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "product_id": "eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-artemis-native@2.0.0-2.redhat_00005.1.el9eap?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "product": { "name": "eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "product_id": "eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap8-artemis-native-wildfly@2.0.0-2.redhat_00005.1.el9eap?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.noarch" }, "product_reference": "eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.src" }, "product_reference": "eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el9eap.noarch" }, "product_reference": "eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el9eap.noarch" }, "product_reference": "eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch" }, "product_reference": "eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el9eap.noarch" }, "product_reference": "eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch" }, "product_reference": "eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch" }, "product_reference": "eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch" }, "product_reference": "eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el9eap.noarch" }, "product_reference": "eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch" }, "product_reference": "eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el9eap.noarch" }, "product_reference": "eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el9eap.noarch" }, "product_reference": "eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el9eap.noarch" }, "product_reference": "eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.noarch" }, "product_reference": "eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src" }, "product_reference": "eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el9eap.noarch" }, "product_reference": "eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch" }, "product_reference": "eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.src" }, "product_reference": "eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.src" }, "product_reference": "eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.noarch" }, "product_reference": "eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.src" }, "product_reference": "eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.noarch" }, "product_reference": "eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.src" }, "product_reference": "eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.src" }, "product_reference": "eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.noarch" }, "product_reference": "eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.src" }, "product_reference": "eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.src" }, "product_reference": "eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src" }, "product_reference": "eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.x86_64 as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.x86_64" }, "product_reference": "eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el9eap.x86_64 as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el9eap.x86_64" }, "product_reference": "eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.noarch" }, "product_reference": "eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.src" }, "product_reference": "eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.noarch" }, "product_reference": "eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.src" }, "product_reference": "eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.noarch" }, "product_reference": "eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.src" }, "product_reference": "eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el9eap.noarch" }, "product_reference": "eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el9eap.noarch" }, "product_reference": "eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el9eap.noarch" }, "product_reference": "eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.src" }, "product_reference": "eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.src" }, "product_reference": "eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.src" }, "product_reference": "eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch" }, "product_reference": "eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.src" }, "product_reference": "eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch" }, "product_reference": "eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch" }, "product_reference": "eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.src" }, "product_reference": "eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.src" }, "product_reference": "eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src" }, "product_reference": "eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.src" }, "product_reference": "eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src" }, "product_reference": "eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64 as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64" }, "product_reference": "eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.src" }, "product_reference": "eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.src" }, "product_reference": "eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.src" }, "product_reference": "eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el9eap.noarch" }, "product_reference": "eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.noarch" }, "product_reference": "eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.src" }, "product_reference": "eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.src" }, "product_reference": "eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.src" }, "product_reference": "eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.noarch" }, "product_reference": "eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.src" }, "product_reference": "eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el9eap.noarch" }, "product_reference": "eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.src" }, "product_reference": "eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.src" }, "product_reference": "eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.src" }, "product_reference": "eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.src" }, "product_reference": "eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.src" }, "product_reference": "eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.src" }, "product_reference": "eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.noarch" }, "product_reference": "eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.src" }, "product_reference": "eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch" }, "product_reference": "eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.src as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.src" }, "product_reference": "eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.src", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch" }, "product_reference": "eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch" }, "product_reference": "eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch" }, "product_reference": "eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" }, { "category": "default_component_of", "full_product_name": { "name": "eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch as a component of Red Hat JBoss EAP 8.0 for RHEL 9", "product_id": "9Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch" }, "product_reference": "eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "relates_to_product_reference": "9Base-JBEAP-8.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108554" } ], "notes": [ { "category": "description", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "RHBZ#2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-34169", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-04T20:13:24+00:00", "details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8824" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)" }, { "cve": "CVE-2023-52428", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2024-09-04T17:02:58.468000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2309764" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the Nimbus Jose JWT package. This issue could allow an attacker to use a malicious large JWE p2c header value for PasswordBasedDecrypter and cause a Denial of Service (DoS).", "title": "Vulnerability description" }, { "category": "summary", "text": "nimbus-jose-jwt: large JWE p2c header value causes Denial of Service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-52428" }, { "category": "external", "summary": "RHBZ#2309764", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309764" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-52428", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52428" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-52428", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52428" } ], "release_date": "2024-02-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-04T20:13:24+00:00", "details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8824" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "nimbus-jose-jwt: large JWE p2c header value causes Denial of Service" }, { "cve": "CVE-2024-4029", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2024-04-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2278615" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Wildfly\u2019s management interface. Due to the lack of limitation of sockets for the management interface, it may be possible to cause a denial of service hitting the nofile limit as there is no possibility to configure or set a maximum number of connections.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly: No timeout for EAP management interface may lead to Denial of Service (DoS)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat rates this as a Low impact since this requires high privileges to jeopardize the system. The management interface is normally internal/local only and not exposed externally.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-4029" }, { "category": "external", "summary": "RHBZ#2278615", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278615" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-4029", "url": "https://www.cve.org/CVERecord?id=CVE-2024-4029" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-4029", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4029" } ], "release_date": "2024-05-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-04T20:13:24+00:00", "details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8824" }, { "category": "workaround", "details": "Currently there is no available mitigation for this vulnerability. Please make sure to perform updates as they become available.", "product_ids": [ "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "wildfly: No timeout for EAP management interface may lead to Denial of Service (DoS)" }, { "acknowledgments": [ { "names": [ "Tanner Emek" ] } ], "cve": "CVE-2024-8698", "cwe": { "id": "CWE-347", "name": "Improper Verification of Cryptographic Signature" }, "discovery_date": "2024-09-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2311641" } ], "notes": [ { "category": "description", "text": "A flaw exists in the SAML signature validation method within the Keycloak XMLSignatureUtil class. The method incorrectly determines whether a SAML signature is for the full document or only for specific assertions based on the position of the signature in the XML document, rather than the Reference element used to specify the signed element. This flaw allows attackers to create crafted responses that can bypass the validation, potentially leading to privilege escalation or impersonation attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak-saml-core: Improper Verification of SAML Responses Leading to Privilege Escalation in Keycloak", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is of high severity due to its potential to facilitate privilege escalation and user impersonation in systems using SAML for authentication. The core issue stems from improper validation logic in Keycloak\u0027s signature validation method, which relies on the position of signatures rather than explicitly checking the referenced elements. By manipulating the XML structure, an attacker can bypass signature validation and inject an unsigned assertion while retaining a valid signed one. This allows unauthorized access to high-privileged accounts, leading to significant security risks in SAML-based identity providers and service providers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-8698" }, { "category": "external", "summary": "RHBZ#2311641", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2311641" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-8698", "url": "https://www.cve.org/CVERecord?id=CVE-2024-8698" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-8698", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-8698" } ], "release_date": "2024-09-19T15:12:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-04T20:13:24+00:00", "details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8824" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:L", "version": "3.1" }, "products": [ "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "keycloak-saml-core: Improper Verification of SAML Responses Leading to Privilege Escalation in Keycloak" }, { "acknowledgments": [ { "names": [ "Niklas Conrad", "Karsten Meyer zu Selhausen" ] } ], "cve": "CVE-2024-8883", "cwe": { "id": "CWE-601", "name": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)" }, "discovery_date": "2024-09-16T06:17:01.573000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2312511" } ], "notes": [ { "category": "description", "text": "A misconfiguration flaw was found in Keycloak. This issue can allow an attacker to redirect users to an arbitrary URL if a \u0027Valid Redirect URI\u0027 is set to http://localhost or http://127.0.0.1, enabling sensitive information such as authorization codes to be exposed to the attacker, potentially leading to session hijacking.", "title": "Vulnerability description" }, { "category": "summary", "text": "Keycloak: Vulnerable Redirect URI Validation Results in Open Redirec", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-8883" }, { "category": "external", "summary": "RHBZ#2312511", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2312511" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-8883", "url": "https://www.cve.org/CVERecord?id=CVE-2024-8883" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-8883", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-8883" }, { "category": "external", "summary": "https://github.com/keycloak/keycloak/blob/main/services/src/main/java/org/keycloak/protocol/oidc/utils/RedirectUtils.java", "url": "https://github.com/keycloak/keycloak/blob/main/services/src/main/java/org/keycloak/protocol/oidc/utils/RedirectUtils.java" } ], "release_date": "2024-09-19T15:13:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-04T20:13:24+00:00", "details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8824" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Keycloak: Vulnerable Redirect URI Validation Results in Open Redirec" }, { "cve": "CVE-2024-41172", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "discovery_date": "2024-07-19T09:20:34+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2298829" } ], "notes": [ { "category": "description", "text": "A memory consumption flaw was found in Apache CXF. This issue may allow a CXF HTTP client conduit to prevent HTTPClient instances from being garbage collected, eventually causing the application to run out of memory.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache: cxf: org.apache.cxf:cxf-rt-transports-http: unrestricted memory consumption in CXF HTTP clients", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-41172" }, { "category": "external", "summary": "RHBZ#2298829", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2298829" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-41172", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41172" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41172", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41172" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-4mgg-fqfq-64hg", "url": "https://github.com/advisories/GHSA-4mgg-fqfq-64hg" }, { "category": "external", "summary": "https://lists.apache.org/thread/n2hvbrgwpdtcqdccod8by28ynnolybl6", "url": "https://lists.apache.org/thread/n2hvbrgwpdtcqdccod8by28ynnolybl6" }, { "category": "external", "summary": "https://osv.dev/vulnerability/GHSA-4mgg-fqfq-64hg", "url": "https://osv.dev/vulnerability/GHSA-4mgg-fqfq-64hg" } ], "release_date": "2024-07-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-04T20:13:24+00:00", "details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8824" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-0:2.33.0-1.redhat_00015.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-cli-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-commons-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-core-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-dto-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hornetq-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-hqclient-protocol-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-client-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-ra-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jakarta-service-extensions-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-jdbc-store-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-journal-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-activemq-artemis-selector-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-activemq-artemis-server-0:2.33.0-1.redhat_00015.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-extensions-0:1.8.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aesh-readline-0:2.2.0-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-codec-0:1.16.1-2.redhat_00007.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-collections-0:3.2.2-28.redhat_2.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-io-0:2.15.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-commons-lang-0:3.14.0-2.redhat_00006.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-0:4.0.5-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-apache-cxf-rt-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-services-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-apache-cxf-tools-0:4.0.5-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-artemis-native-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-native-wildfly-1:2.0.0-2.redhat_00005.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-artemis-wildfly-integration-0:2.0.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-asyncutil-0:0.1.0-2.redhat_00010.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-0:1.12.284-2.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-aws-java-sdk-core-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-kms-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-aws-java-sdk-s3-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-cryptacular-0:1.2.5-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-eap-product-conf-parent-0:800.4.0-1.GA_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-eap-product-conf-wildfly-ee-feature-pack-0:800.4.0-1.GA_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-fastinfoset-0:2.1.0-4.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-0:6.2.31-1.Final_redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-core-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-envers-0:6.2.31-1.Final_redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hibernate-validator-0:8.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-hibernate-validator-cdi-0:8.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-hppc-0:0.8.1-2.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-insights-java-client-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jakarta-servlet-jsp-jstl-api-0:3.0.1-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jboss-cert-helper-0:1.1.3-1.redhat_00001.1.el9eap.x86_64", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jboss-logging-0:3.5.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jctools-0:4.0.2-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jctools-core-0:4.0.2-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-jgroups-0:5.3.10-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-jmespath-java-0:1.12.284-2.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-log4j-0:2.22.1-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-0:6.0.3-1.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-narayana-jbosstxbridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jbossxts-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-idlj-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-jts-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-api-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-bridge-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-integration-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-narayana-restat-util-0:6.0.3-1.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-nimbus-jose-jwt-0:9.37.3-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-objectweb-asm-0:9.6.0-1.redhat_00002.1.el9eap.src", "9Base-JBEAP-8.0:eap8-objectweb-asm-util-0:9.6.0-1.redhat_00002.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-pem-keystore-0:2.3.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-extensions-0:2.0.1-3.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-resteasy-spring-0:3.0.1-2.Final_redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-resteasy-tracing-api-0:2.0.1-3.Final_redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-saaj-impl-0:3.0.4-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-shibboleth-java-support-0:8.0.0-6.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-slf4j-0:2.0.16-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-slf4j-api-0:2.0.16-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-snakeyaml-0:2.2.0-1.redhat_00001.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-0:8.0.4-2.GA_redhat_00005.1.el9eap.src", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk11-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk17-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-java-jdk21-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch", "9Base-JBEAP-8.0:eap8-wildfly-modules-0:8.0.4-2.GA_redhat_00005.1.el9eap.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "apache: cxf: org.apache.cxf:cxf-rt-transports-http: unrestricted memory consumption in CXF HTTP clients" } ] }
rhsa-2022_5736
Vulnerability from csaf_redhat
Published
2022-07-27 13:22
Modified
2024-11-26 03:09
Summary
Red Hat Security Advisory: java-17-openjdk security, bug fix, and enhancement update
Notes
Topic
An update for java-17-openjdk is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit.
The following packages have been upgraded to a later upstream version: java-17-openjdk (17.0.4.0.8). (BZ#2084779)
Security Fix(es):
* OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) (CVE-2022-34169)
* OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540)
* OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541)
* OpenJDK: random exponentials issue (Libraries, 8283875) (CVE-2022-21549)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Previous Red Hat builds of OpenJDK 17 altered the arguments passed to sun.security.pkcs11.wrapper.PKCS11.getInstance() in order to facilitate FIPS support. This build adds an additional form of the method, retaining the original arguments, so that applications which depend on this internal method continue to function with Red Hat builds of OpenJDK. (BZ#2099919)
* With previous Red Hat builds of OpenJDK 17, Mac key generation and import would fail due to the lack of the CKA_SIGN attribute on the key. This attribute is now added as part of the NSS FIPS configuration. (BZ#2105395)
* With the release of Red Hat Enterprise Linux 8.6, a change was made so that disabling OpenJDK FIPS mode required the use of both the -Djava.security.disableSystemPropertiesFile=true and -Dcom.redhat.fips=false options, with the intention that FIPS mode could be controlled independently of system security properties. This change has now been reverted and only -Djava.security.disableSystemPropertiesFile=true is required to disable FIPS mode, as in Red Hat Enterprise Linux 8.4. (BZ#2107941)
* Previous Red Hat builds of OpenJDK 17 running in FIPS mode with a SecurityManager would fail due to a lack of module access permissions. This has now been corrected. (BZ#2107943)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for java-17-openjdk is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit.\n\nThe following packages have been upgraded to a later upstream version: java-17-openjdk (17.0.4.0.8). (BZ#2084779)\n\nSecurity Fix(es):\n\n* OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) (CVE-2022-34169)\n\n* OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540)\n\n* OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541)\n\n* OpenJDK: random exponentials issue (Libraries, 8283875) (CVE-2022-21549)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Previous Red Hat builds of OpenJDK 17 altered the arguments passed to sun.security.pkcs11.wrapper.PKCS11.getInstance() in order to facilitate FIPS support. This build adds an additional form of the method, retaining the original arguments, so that applications which depend on this internal method continue to function with Red Hat builds of OpenJDK. (BZ#2099919)\n\n* With previous Red Hat builds of OpenJDK 17, Mac key generation and import would fail due to the lack of the CKA_SIGN attribute on the key. This attribute is now added as part of the NSS FIPS configuration. (BZ#2105395)\n\n* With the release of Red Hat Enterprise Linux 8.6, a change was made so that disabling OpenJDK FIPS mode required the use of both the -Djava.security.disableSystemPropertiesFile=true and -Dcom.redhat.fips=false options, with the intention that FIPS mode could be controlled independently of system security properties. This change has now been reverted and only -Djava.security.disableSystemPropertiesFile=true is required to disable FIPS mode, as in Red Hat Enterprise Linux 8.4. (BZ#2107941)\n\n* Previous Red Hat builds of OpenJDK 17 running in FIPS mode with a SecurityManager would fail due to a lack of module access permissions. This has now been corrected. (BZ#2107943)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:5736", "url": "https://access.redhat.com/errata/RHSA-2022:5736" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2084779", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084779" }, { "category": "external", "summary": "2099919", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099919" }, { "category": "external", "summary": "2105395", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105395" }, { "category": "external", "summary": "2107941", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107941" }, { "category": "external", "summary": "2107943", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107943" }, { "category": "external", "summary": "2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "2108547", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108547" }, { "category": "external", "summary": "2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5736.json" } ], "title": "Red Hat Security Advisory: java-17-openjdk security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-11-26T03:09:05+00:00", "generator": { "date": "2024-11-26T03:09:05+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2022:5736", "initial_release_date": "2022-07-27T13:22:38+00:00", "revision_history": [ { "date": "2022-07-27T13:22:38+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-07-27T13:22:38+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-26T03:09:05+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream" } } }, { "category": "product_name", "name": "Red Hat CodeReady Linux Builder (v. 9)", "product": { "name": "Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::crb" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-demo-fastdebug@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-demo-slowdebug@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-fastdebug@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-slowdebug@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-fastdebug@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-fastdebug@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-slowdebug@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-jmods-fastdebug@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-jmods-slowdebug@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-slowdebug@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-src-fastdebug@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-src-slowdebug@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-static-libs-fastdebug@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-static-libs-slowdebug@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-debugsource@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-debuginfo@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-debuginfo@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-fastdebug-debuginfo@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-slowdebug-debuginfo@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-fastdebug-debuginfo@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-debuginfo@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-fastdebug-debuginfo@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-slowdebug-debuginfo@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-slowdebug-debuginfo@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-demo@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-javadoc@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-javadoc-zip@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-jmods@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-src@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "product": { "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "product_id": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-static-libs@17.0.4.0.8-2.el9_0?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-demo-fastdebug@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-demo-slowdebug@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-fastdebug@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-slowdebug@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-fastdebug@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-fastdebug@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-slowdebug@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-jmods-fastdebug@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-jmods-slowdebug@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-slowdebug@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-src-fastdebug@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-src-slowdebug@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-static-libs-fastdebug@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-static-libs-slowdebug@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-debugsource@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-debuginfo@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-debuginfo@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-fastdebug-debuginfo@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-slowdebug-debuginfo@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-fastdebug-debuginfo@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-debuginfo@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-fastdebug-debuginfo@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-slowdebug-debuginfo@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-slowdebug-debuginfo@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-demo@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-javadoc@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-javadoc-zip@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-jmods@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-src@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "product": { "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "product_id": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-static-libs@17.0.4.0.8-2.el9_0?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-demo-fastdebug@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-demo-slowdebug@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-fastdebug@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-slowdebug@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-fastdebug@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-fastdebug@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-slowdebug@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-jmods-fastdebug@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-jmods-slowdebug@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-slowdebug@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-src-fastdebug@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-src-slowdebug@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-static-libs-fastdebug@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-static-libs-slowdebug@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-debugsource@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-debuginfo@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-debuginfo@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-fastdebug-debuginfo@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-slowdebug-debuginfo@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-fastdebug-debuginfo@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-debuginfo@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-fastdebug-debuginfo@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-slowdebug-debuginfo@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-slowdebug-debuginfo@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-demo@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-javadoc@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-javadoc-zip@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-jmods@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-src@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "product": { "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "product_id": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-static-libs@17.0.4.0.8-2.el9_0?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "product": { "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "product_id": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-demo-slowdebug@17.0.4.0.8-2.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "product": { "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "product_id": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-slowdebug@17.0.4.0.8-2.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "product": { "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "product_id": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-slowdebug@17.0.4.0.8-2.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "product": { "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "product_id": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-jmods-slowdebug@17.0.4.0.8-2.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "product": { "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "product_id": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-slowdebug@17.0.4.0.8-2.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "product": { "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "product_id": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-src-slowdebug@17.0.4.0.8-2.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "product": { "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "product_id": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-static-libs-slowdebug@17.0.4.0.8-2.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "product": { "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "product_id": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-debugsource@17.0.4.0.8-2.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "product": { "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "product_id": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-debuginfo@17.0.4.0.8-2.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "product": { "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "product_id": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-debuginfo@17.0.4.0.8-2.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "product": { "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "product_id": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel-slowdebug-debuginfo@17.0.4.0.8-2.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "product": { "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "product_id": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-debuginfo@17.0.4.0.8-2.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "product": { "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "product_id": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless-slowdebug-debuginfo@17.0.4.0.8-2.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "product": { "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "product_id": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-slowdebug-debuginfo@17.0.4.0.8-2.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "product": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "product_id": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk@17.0.4.0.8-2.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "product": { "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "product_id": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-demo@17.0.4.0.8-2.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "product": { "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "product_id": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-devel@17.0.4.0.8-2.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "product": { "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "product_id": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-headless@17.0.4.0.8-2.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "product": { "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "product_id": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-javadoc@17.0.4.0.8-2.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "product": { "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "product_id": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-javadoc-zip@17.0.4.0.8-2.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "product": { "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "product_id": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-jmods@17.0.4.0.8-2.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "product": { "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "product_id": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-src@17.0.4.0.8-2.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "product": { "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "product_id": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk-static-libs@17.0.4.0.8-2.el9_0?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "product": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "product_id": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-17-openjdk@17.0.4.0.8-2.el9_0?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.src as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.src" }, "product_reference": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.src as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.src" }, "product_reference": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64" }, "product_reference": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le" }, "product_reference": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x" }, "product_reference": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64" }, "product_reference": "java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21540", "cwe": { "id": "CWE-402", "name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108540" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: class compilation issue (Hotspot, 8281859)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21540" }, { "category": "external", "summary": "RHBZ#2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21540", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21540" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-27T13:22:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5736" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: class compilation issue (Hotspot, 8281859)" }, { "cve": "CVE-2022-21541", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108543" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21541" }, { "category": "external", "summary": "RHBZ#2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21541", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21541" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-27T13:22:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5736" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)" }, { "cve": "CVE-2022-21549", "cwe": { "id": "CWE-1068", "name": "Inconsistency Between Implementation and Documented Design" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108547" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 17.0.3.1; Oracle GraalVM Enterprise Edition: 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: random exponentials issue (Libraries, 8283875)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21549" }, { "category": "external", "summary": "RHBZ#2108547", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108547" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21549", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21549" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21549", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21549" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-27T13:22:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5736" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: random exponentials issue (Libraries, 8283875)" }, { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108554" } ], "notes": [ { "category": "description", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "RHBZ#2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-34169", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-27T13:22:38+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5736" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-debugsource-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-demo-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-devel-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-fastdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-headless-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-javadoc-zip-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-jmods-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-slowdebug-debuginfo-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-src-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-fastdebug-1:17.0.4.0.8-2.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-17-openjdk-static-libs-slowdebug-1:17.0.4.0.8-2.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)" } ] }
rhsa-2022_5697
Vulnerability from csaf_redhat
Published
2022-07-25 18:48
Modified
2024-11-26 03:08
Summary
Red Hat Security Advisory: java-1.8.0-openjdk security and bug fix update
Notes
Topic
An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 8.4 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.
Security Fix(es):
* OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) (CVE-2022-34169)
* OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540)
* OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* rh1991003 patch breaks sun.security.pkcs11.wrapper.PKCS11.getInstance() [rhel-8, openjdk-8] (BZ#2099912)
* Revert to disabling system security properties and FIPS mode support together [rhel-8, openjdk-8] (BZ#2108565)
* SecretKey generate/import operations don't add the CKA_SIGN attribute in FIPS mode [rhel-8, openjdk-8] (BZ#2108567)
* Detect NSS at Runtime for FIPS detection [rhel-8, openjdk-11] (BZ#2108667)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 8.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.\n\nSecurity Fix(es):\n\n* OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) (CVE-2022-34169)\n\n* OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540)\n\n* OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* rh1991003 patch breaks sun.security.pkcs11.wrapper.PKCS11.getInstance() [rhel-8, openjdk-8] (BZ#2099912)\n\n* Revert to disabling system security properties and FIPS mode support together [rhel-8, openjdk-8] (BZ#2108565)\n\n* SecretKey generate/import operations don\u0027t add the CKA_SIGN attribute in FIPS mode [rhel-8, openjdk-8] (BZ#2108567)\n\n* Detect NSS at Runtime for FIPS detection [rhel-8, openjdk-11] (BZ#2108667)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:5697", "url": "https://access.redhat.com/errata/RHSA-2022:5697" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2099912", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099912" }, { "category": "external", "summary": "2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "2108565", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108565" }, { "category": "external", "summary": "2108567", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108567" }, { "category": "external", "summary": "2108667", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108667" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5697.json" } ], "title": "Red Hat Security Advisory: java-1.8.0-openjdk security and bug fix update", "tracking": { "current_release_date": "2024-11-26T03:08:42+00:00", "generator": { "date": "2024-11-26T03:08:42+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2022:5697", "initial_release_date": "2022-07-25T18:48:12+00:00", "revision_history": [ { "date": "2022-07-25T18:48:12+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-07-25T18:48:12+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-26T03:08:42+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:8.4::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux CRB EUS (v.8.4)", "product": { "name": "Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:8.4::crb" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.src", "product": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.src", "product_id": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk@1.8.0.342.b07-1.el8_4?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.aarch64", "product": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.aarch64", "product_id": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk@1.8.0.342.b07-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.aarch64", "product": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.aarch64", "product_id": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility@1.8.0.342.b07-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.aarch64", "product": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.aarch64", "product_id": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo@1.8.0.342.b07-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.aarch64", "product": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.aarch64", "product_id": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel@1.8.0.342.b07-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.aarch64", "product": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.aarch64", "product_id": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless@1.8.0.342.b07-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.aarch64", "product": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.aarch64", "product_id": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src@1.8.0.342.b07-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.aarch64", "product": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.aarch64", "product_id": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debugsource@1.8.0.342.b07-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "product": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "product_id": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debuginfo@1.8.0.342.b07-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "product": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "product_id": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-debuginfo@1.8.0.342.b07-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "product": { "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "product_id": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-slowdebug-debuginfo@1.8.0.342.b07-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "product": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "product_id": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-debuginfo@1.8.0.342.b07-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "product": { "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "product_id": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-slowdebug-debuginfo@1.8.0.342.b07-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "product": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "product_id": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-debuginfo@1.8.0.342.b07-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "product": { "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "product_id": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-slowdebug-debuginfo@1.8.0.342.b07-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "product": { "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "product_id": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-slowdebug-debuginfo@1.8.0.342.b07-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "product": { "name": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "product_id": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility-slowdebug@1.8.0.342.b07-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "product": { "name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "product_id": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-slowdebug@1.8.0.342.b07-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "product": { "name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "product_id": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-slowdebug@1.8.0.342.b07-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "product": { "name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "product_id": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-slowdebug@1.8.0.342.b07-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "product": { "name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "product_id": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-slowdebug@1.8.0.342.b07-1.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "product": { "name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "product_id": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src-slowdebug@1.8.0.342.b07-1.el8_4?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.ppc64le", "product": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_id": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk@1.8.0.342.b07-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.ppc64le", "product": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_id": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility@1.8.0.342.b07-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.ppc64le", "product": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_id": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo@1.8.0.342.b07-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.ppc64le", "product": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_id": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel@1.8.0.342.b07-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.ppc64le", "product": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_id": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless@1.8.0.342.b07-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.ppc64le", "product": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_id": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src@1.8.0.342.b07-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.ppc64le", "product": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_id": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debugsource@1.8.0.342.b07-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "product": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_id": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debuginfo@1.8.0.342.b07-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "product": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_id": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-debuginfo@1.8.0.342.b07-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "product": { "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_id": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-slowdebug-debuginfo@1.8.0.342.b07-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "product": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_id": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-debuginfo@1.8.0.342.b07-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "product": { "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_id": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-slowdebug-debuginfo@1.8.0.342.b07-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "product": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_id": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-debuginfo@1.8.0.342.b07-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "product": { "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_id": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-slowdebug-debuginfo@1.8.0.342.b07-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "product": { "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_id": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-slowdebug-debuginfo@1.8.0.342.b07-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "product": { "name": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_id": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility-slowdebug@1.8.0.342.b07-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "product": { "name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_id": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-slowdebug@1.8.0.342.b07-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "product": { "name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_id": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-slowdebug@1.8.0.342.b07-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "product": { "name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_id": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-slowdebug@1.8.0.342.b07-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "product": { "name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_id": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-slowdebug@1.8.0.342.b07-1.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "product": { "name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_id": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src-slowdebug@1.8.0.342.b07-1.el8_4?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.x86_64", "product": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.x86_64", "product_id": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk@1.8.0.342.b07-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.x86_64", "product": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.x86_64", "product_id": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility@1.8.0.342.b07-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.x86_64", "product": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.x86_64", "product_id": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo@1.8.0.342.b07-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.x86_64", "product": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.x86_64", "product_id": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel@1.8.0.342.b07-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.x86_64", "product": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.x86_64", "product_id": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless@1.8.0.342.b07-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.x86_64", "product": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.x86_64", "product_id": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src@1.8.0.342.b07-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.x86_64", "product": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.x86_64", "product_id": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debugsource@1.8.0.342.b07-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "product": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "product_id": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debuginfo@1.8.0.342.b07-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "product": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "product_id": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-debuginfo@1.8.0.342.b07-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "product": { "name": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "product_id": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-fastdebug-debuginfo@1.8.0.342.b07-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "product": { "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "product_id": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-slowdebug-debuginfo@1.8.0.342.b07-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "product": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "product_id": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-debuginfo@1.8.0.342.b07-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "product": { "name": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "product_id": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-fastdebug-debuginfo@1.8.0.342.b07-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "product": { "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "product_id": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-slowdebug-debuginfo@1.8.0.342.b07-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "product": { "name": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "product_id": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-fastdebug-debuginfo@1.8.0.342.b07-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "product": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "product_id": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-debuginfo@1.8.0.342.b07-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "product": { "name": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "product_id": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-fastdebug-debuginfo@1.8.0.342.b07-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "product": { "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "product_id": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-slowdebug-debuginfo@1.8.0.342.b07-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "product": { "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "product_id": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-slowdebug-debuginfo@1.8.0.342.b07-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "product": { "name": "java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "product_id": "java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility-fastdebug@1.8.0.342.b07-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "product": { "name": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "product_id": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility-slowdebug@1.8.0.342.b07-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "product": { "name": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "product_id": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-fastdebug@1.8.0.342.b07-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "product": { "name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "product_id": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-slowdebug@1.8.0.342.b07-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "product": { "name": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "product_id": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-fastdebug@1.8.0.342.b07-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "product": { "name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "product_id": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-slowdebug@1.8.0.342.b07-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "product": { "name": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "product_id": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-fastdebug@1.8.0.342.b07-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "product": { "name": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "product_id": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-fastdebug@1.8.0.342.b07-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "product": { "name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "product_id": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-slowdebug@1.8.0.342.b07-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "product": { "name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "product_id": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-slowdebug@1.8.0.342.b07-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "product": { "name": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "product_id": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src-fastdebug@1.8.0.342.b07-1.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "product": { "name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "product_id": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src-slowdebug@1.8.0.342.b07-1.el8_4?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.s390x", "product": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.s390x", "product_id": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk@1.8.0.342.b07-1.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.s390x", "product": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.s390x", "product_id": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility@1.8.0.342.b07-1.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.s390x", "product": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.s390x", "product_id": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo@1.8.0.342.b07-1.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.s390x", "product": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.s390x", "product_id": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel@1.8.0.342.b07-1.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.s390x", "product": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.s390x", "product_id": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless@1.8.0.342.b07-1.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.s390x", "product": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.s390x", "product_id": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src@1.8.0.342.b07-1.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.s390x", "product": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.s390x", "product_id": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debugsource@1.8.0.342.b07-1.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "product": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "product_id": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debuginfo@1.8.0.342.b07-1.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "product": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "product_id": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-debuginfo@1.8.0.342.b07-1.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "product": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "product_id": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-debuginfo@1.8.0.342.b07-1.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "product": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "product_id": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-debuginfo@1.8.0.342.b07-1.el8_4?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_4.noarch", "product": { "name": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_4.noarch", "product_id": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-javadoc@1.8.0.342.b07-1.el8_4?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_4.noarch", "product": { "name": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_4.noarch", "product_id": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-javadoc-zip@1.8.0.342.b07-1.el8_4?arch=noarch\u0026epoch=1" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.s390x" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.src as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.src" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.src", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.s390x" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.s390x" }, "product_reference": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.s390x" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x" }, "product_reference": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.s390x" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x" }, "product_reference": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.s390x" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x" }, "product_reference": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_4.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_4.noarch" }, "product_reference": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_4.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_4.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_4.noarch" }, "product_reference": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_4.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.s390x" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.s390x" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.s390x", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.src as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.src" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.src", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.s390x" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.s390x", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.s390x" }, "product_reference": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.s390x", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.s390x" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.s390x", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x" }, "product_reference": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.s390x" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.s390x", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x" }, "product_reference": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.s390x" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.s390x", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x" }, "product_reference": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_4.noarch as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_4.noarch" }, "product_reference": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_4.noarch", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_4.noarch as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_4.noarch" }, "product_reference": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_4.noarch", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.s390x" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.s390x", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64" }, "product_reference": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le" }, "product_reference": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)", "product_id": "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64" }, "product_reference": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "relates_to_product_reference": "CRB-8.4.0.Z.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21540", "cwe": { "id": "CWE-402", "name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108540" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: class compilation issue (Hotspot, 8281859)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.src", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_4.noarch", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_4.noarch", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.src", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_4.noarch", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_4.noarch", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21540" }, { "category": "external", "summary": "RHBZ#2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21540", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21540" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-25T18:48:12+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.src", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_4.noarch", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_4.noarch", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.src", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_4.noarch", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_4.noarch", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5697" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.src", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_4.noarch", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_4.noarch", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.src", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_4.noarch", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_4.noarch", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: class compilation issue (Hotspot, 8281859)" }, { "cve": "CVE-2022-21541", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108543" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.src", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_4.noarch", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_4.noarch", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.src", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_4.noarch", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_4.noarch", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21541" }, { "category": "external", "summary": "RHBZ#2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21541", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21541" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-25T18:48:12+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.src", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_4.noarch", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_4.noarch", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.src", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_4.noarch", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_4.noarch", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5697" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.src", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_4.noarch", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_4.noarch", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.src", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_4.noarch", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_4.noarch", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)" }, { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108554" } ], "notes": [ { "category": "description", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.src", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_4.noarch", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_4.noarch", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.src", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_4.noarch", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_4.noarch", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "RHBZ#2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-34169", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-25T18:48:12+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.src", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_4.noarch", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_4.noarch", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.src", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_4.noarch", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_4.noarch", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5697" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.src", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_4.noarch", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_4.noarch", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.s390x", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "AppStream-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.src", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-accessibility-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_4.noarch", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_4.noarch", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.s390x", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el8_4.x86_64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.aarch64", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.ppc64le", "CRB-8.4.0.Z.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el8_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)" } ] }
rhsa-2022_5709
Vulnerability from csaf_redhat
Published
2022-07-25 23:19
Modified
2024-11-26 03:08
Summary
Red Hat Security Advisory: java-1.8.0-openjdk security, bug fix, and enhancement update
Notes
Topic
An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.
The following packages have been upgraded to a later upstream version: java-1.8.0-openjdk (1.8.0.342.b07). (BZ#2084776)
Security Fix(es):
* OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) (CVE-2022-34169)
* OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540)
* OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* rh1991003 patch breaks sun.security.pkcs11.wrapper.PKCS11.getInstance() [rhel-9, openjdk-8] (BZ#2099916)
* SecretKey generate/import operations don't add the CKA_SIGN attribute in FIPS mode [rhel-9, openjdk-8] (BZ#2107956)
* Revert to disabling system security properties and FIPS mode support together [rhel-9, openjdk-8] (BZ#2107958)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.\n\nThe following packages have been upgraded to a later upstream version: java-1.8.0-openjdk (1.8.0.342.b07). (BZ#2084776)\n\nSecurity Fix(es):\n\n* OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) (CVE-2022-34169)\n\n* OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540)\n\n* OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* rh1991003 patch breaks sun.security.pkcs11.wrapper.PKCS11.getInstance() [rhel-9, openjdk-8] (BZ#2099916)\n\n* SecretKey generate/import operations don\u0027t add the CKA_SIGN attribute in FIPS mode [rhel-9, openjdk-8] (BZ#2107956)\n\n* Revert to disabling system security properties and FIPS mode support together [rhel-9, openjdk-8] (BZ#2107958)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:5709", "url": "https://access.redhat.com/errata/RHSA-2022:5709" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2084776", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084776" }, { "category": "external", "summary": "2099916", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099916" }, { "category": "external", "summary": "2107956", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107956" }, { "category": "external", "summary": "2107958", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107958" }, { "category": "external", "summary": "2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5709.json" } ], "title": "Red Hat Security Advisory: java-1.8.0-openjdk security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-11-26T03:08:49+00:00", "generator": { "date": "2024-11-26T03:08:49+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2022:5709", "initial_release_date": "2022-07-25T23:19:11+00:00", "revision_history": [ { "date": "2022-07-25T23:19:11+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-07-25T23:19:11+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-26T03:08:49+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream" } } }, { "category": "product_name", "name": "Red Hat CodeReady Linux Builder (v. 9)", "product": { "name": "Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::crb" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "product": { "name": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "product_id": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-fastdebug@1.8.0.342.b07-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "product": { "name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "product_id": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-slowdebug@1.8.0.342.b07-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "product": { "name": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "product_id": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-fastdebug@1.8.0.342.b07-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "product": { "name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "product_id": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-slowdebug@1.8.0.342.b07-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "product": { "name": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "product_id": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-fastdebug@1.8.0.342.b07-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "product": { "name": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "product_id": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-fastdebug@1.8.0.342.b07-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "product": { "name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "product_id": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-slowdebug@1.8.0.342.b07-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "product": { "name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "product_id": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-slowdebug@1.8.0.342.b07-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "product": { "name": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "product_id": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src-fastdebug@1.8.0.342.b07-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "product": { "name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "product_id": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src-slowdebug@1.8.0.342.b07-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.aarch64", "product": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.aarch64", "product_id": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debugsource@1.8.0.342.b07-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "product": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "product_id": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debuginfo@1.8.0.342.b07-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "product": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "product_id": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-debuginfo@1.8.0.342.b07-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "product": { "name": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "product_id": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-fastdebug-debuginfo@1.8.0.342.b07-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "product": { "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "product_id": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-slowdebug-debuginfo@1.8.0.342.b07-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "product": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "product_id": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-debuginfo@1.8.0.342.b07-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "product": { "name": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "product_id": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-fastdebug-debuginfo@1.8.0.342.b07-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "product": { "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "product_id": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-slowdebug-debuginfo@1.8.0.342.b07-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "product": { "name": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "product_id": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-fastdebug-debuginfo@1.8.0.342.b07-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "product": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "product_id": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-debuginfo@1.8.0.342.b07-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "product": { "name": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "product_id": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-fastdebug-debuginfo@1.8.0.342.b07-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "product": { "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "product_id": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-slowdebug-debuginfo@1.8.0.342.b07-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "product": { "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "product_id": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-slowdebug-debuginfo@1.8.0.342.b07-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.aarch64", "product": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.aarch64", "product_id": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk@1.8.0.342.b07-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.aarch64", "product": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.aarch64", "product_id": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo@1.8.0.342.b07-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.aarch64", "product": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.aarch64", "product_id": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel@1.8.0.342.b07-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.aarch64", "product": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.aarch64", "product_id": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless@1.8.0.342.b07-1.el9_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.aarch64", "product": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.aarch64", "product_id": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src@1.8.0.342.b07-1.el9_0?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "product": { "name": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_id": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-fastdebug@1.8.0.342.b07-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "product": { "name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_id": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-slowdebug@1.8.0.342.b07-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "product": { "name": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_id": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-fastdebug@1.8.0.342.b07-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "product": { "name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_id": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-slowdebug@1.8.0.342.b07-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "product": { "name": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_id": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-fastdebug@1.8.0.342.b07-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "product": { "name": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_id": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-fastdebug@1.8.0.342.b07-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "product": { "name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_id": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-slowdebug@1.8.0.342.b07-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "product": { "name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_id": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-slowdebug@1.8.0.342.b07-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "product": { "name": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_id": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src-fastdebug@1.8.0.342.b07-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "product": { "name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_id": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src-slowdebug@1.8.0.342.b07-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.ppc64le", "product": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_id": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debugsource@1.8.0.342.b07-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "product": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_id": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debuginfo@1.8.0.342.b07-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "product": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_id": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-debuginfo@1.8.0.342.b07-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "product": { "name": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_id": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-fastdebug-debuginfo@1.8.0.342.b07-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "product": { "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_id": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-slowdebug-debuginfo@1.8.0.342.b07-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "product": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_id": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-debuginfo@1.8.0.342.b07-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "product": { "name": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_id": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-fastdebug-debuginfo@1.8.0.342.b07-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "product": { "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_id": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-slowdebug-debuginfo@1.8.0.342.b07-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "product": { "name": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_id": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-fastdebug-debuginfo@1.8.0.342.b07-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "product": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_id": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-debuginfo@1.8.0.342.b07-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "product": { "name": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_id": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-fastdebug-debuginfo@1.8.0.342.b07-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "product": { "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_id": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-slowdebug-debuginfo@1.8.0.342.b07-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "product": { "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_id": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-slowdebug-debuginfo@1.8.0.342.b07-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.ppc64le", "product": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_id": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk@1.8.0.342.b07-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.ppc64le", "product": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_id": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo@1.8.0.342.b07-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.ppc64le", "product": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_id": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel@1.8.0.342.b07-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.ppc64le", "product": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_id": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless@1.8.0.342.b07-1.el9_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.ppc64le", "product": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_id": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src@1.8.0.342.b07-1.el9_0?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "product": { "name": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "product_id": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-fastdebug@1.8.0.342.b07-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "product": { "name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "product_id": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-slowdebug@1.8.0.342.b07-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "product": { "name": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "product_id": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-fastdebug@1.8.0.342.b07-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "product": { "name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "product_id": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-slowdebug@1.8.0.342.b07-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "product": { "name": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "product_id": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-fastdebug@1.8.0.342.b07-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "product": { "name": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "product_id": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-fastdebug@1.8.0.342.b07-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "product": { "name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "product_id": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-slowdebug@1.8.0.342.b07-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "product": { "name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "product_id": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-slowdebug@1.8.0.342.b07-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "product": { "name": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "product_id": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src-fastdebug@1.8.0.342.b07-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "product": { "name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "product_id": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src-slowdebug@1.8.0.342.b07-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.x86_64", "product": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.x86_64", "product_id": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debugsource@1.8.0.342.b07-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "product": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "product_id": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debuginfo@1.8.0.342.b07-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "product": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "product_id": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-debuginfo@1.8.0.342.b07-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "product": { "name": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "product_id": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-fastdebug-debuginfo@1.8.0.342.b07-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "product": { "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "product_id": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-slowdebug-debuginfo@1.8.0.342.b07-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "product": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "product_id": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-debuginfo@1.8.0.342.b07-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "product": { "name": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "product_id": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-fastdebug-debuginfo@1.8.0.342.b07-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "product": { "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "product_id": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-slowdebug-debuginfo@1.8.0.342.b07-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "product": { "name": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "product_id": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-fastdebug-debuginfo@1.8.0.342.b07-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "product": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "product_id": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-debuginfo@1.8.0.342.b07-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "product": { "name": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "product_id": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-fastdebug-debuginfo@1.8.0.342.b07-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "product": { "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "product_id": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-slowdebug-debuginfo@1.8.0.342.b07-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "product": { "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "product_id": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-slowdebug-debuginfo@1.8.0.342.b07-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.x86_64", "product": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.x86_64", "product_id": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk@1.8.0.342.b07-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.x86_64", "product": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.x86_64", "product_id": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo@1.8.0.342.b07-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.x86_64", "product": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.x86_64", "product_id": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel@1.8.0.342.b07-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.x86_64", "product": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.x86_64", "product_id": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless@1.8.0.342.b07-1.el9_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.x86_64", "product": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.x86_64", "product_id": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src@1.8.0.342.b07-1.el9_0?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.src", "product": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.src", "product_id": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk@1.8.0.342.b07-1.el9_0?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.s390x", "product": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.s390x", "product_id": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk@1.8.0.342.b07-1.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.s390x", "product": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.s390x", "product_id": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo@1.8.0.342.b07-1.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.s390x", "product": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.s390x", "product_id": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel@1.8.0.342.b07-1.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.s390x", "product": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.s390x", "product_id": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless@1.8.0.342.b07-1.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.s390x", "product": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.s390x", "product_id": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src@1.8.0.342.b07-1.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.s390x", "product": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.s390x", "product_id": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debugsource@1.8.0.342.b07-1.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "product": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "product_id": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debuginfo@1.8.0.342.b07-1.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "product": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "product_id": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-debuginfo@1.8.0.342.b07-1.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "product": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "product_id": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-debuginfo@1.8.0.342.b07-1.el9_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "product": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "product_id": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-debuginfo@1.8.0.342.b07-1.el9_0?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el9_0.noarch", "product": { "name": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el9_0.noarch", "product_id": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el9_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-javadoc@1.8.0.342.b07-1.el9_0?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el9_0.noarch", "product": { "name": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el9_0.noarch", "product_id": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el9_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-javadoc-zip@1.8.0.342.b07-1.el9_0?arch=noarch\u0026epoch=1" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.s390x" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.src as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.src" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.src", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.s390x" }, "product_reference": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.s390x" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x" }, "product_reference": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.s390x" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x" }, "product_reference": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.s390x" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x" }, "product_reference": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el9_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el9_0.noarch" }, "product_reference": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el9_0.noarch", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el9_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el9_0.noarch" }, "product_reference": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el9_0.noarch", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.s390x" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.s390x" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.src as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.src" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.src", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.s390x" }, "product_reference": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.s390x" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x" }, "product_reference": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.s390x" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x" }, "product_reference": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.s390x" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x" }, "product_reference": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el9_0.noarch as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el9_0.noarch" }, "product_reference": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el9_0.noarch", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el9_0.noarch as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el9_0.noarch" }, "product_reference": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el9_0.noarch", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.s390x" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64" }, "product_reference": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le" }, "product_reference": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64" }, "product_reference": "java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21540", "cwe": { "id": "CWE-402", "name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108540" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: class compilation issue (Hotspot, 8281859)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el9_0.noarch", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el9_0.noarch", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21540" }, { "category": "external", "summary": "RHBZ#2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21540", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21540" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-25T23:19:11+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el9_0.noarch", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el9_0.noarch", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5709" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el9_0.noarch", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el9_0.noarch", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: class compilation issue (Hotspot, 8281859)" }, { "cve": "CVE-2022-21541", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108543" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el9_0.noarch", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el9_0.noarch", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21541" }, { "category": "external", "summary": "RHBZ#2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21541", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21541" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-25T23:19:11+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el9_0.noarch", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el9_0.noarch", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5709" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el9_0.noarch", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el9_0.noarch", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)" }, { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108554" } ], "notes": [ { "category": "description", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el9_0.noarch", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el9_0.noarch", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "RHBZ#2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-34169", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-25T23:19:11+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el9_0.noarch", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el9_0.noarch", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5709" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-fastdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el9_0.noarch", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el9_0.noarch", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-fastdebug-1:1.8.0.342.b07-1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:java-1.8.0-openjdk-src-slowdebug-1:1.8.0.342.b07-1.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)" } ] }
rhsa-2022_5757
Vulnerability from csaf_redhat
Published
2022-07-28 15:45
Modified
2024-11-26 03:09
Summary
Red Hat Security Advisory: OpenJDK 17.0.4 security update for Windows Builds
Notes
Topic
The Red Hat build of OpenJDK 17 (java-17-openjdk) is now available for Windows.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The OpenJDK 17 packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit.
This release of the Red Hat build of OpenJDK 17 (17.0.4) for Windows
serves as a replacement for the Red Hat build of OpenJDK 17 (17.0.3) and
includes security and bug fixes, and enhancements. For further information,
refer to the release notes linked to in the References section.
Security Fix(es):
* OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540)
* OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541)
* OpenJDK: integer truncation issue in Xalan (JAXP, 8285407) (CVE-2022-34169)
* OpenJDK: random exponentials issue (Libraries, 8283875) (CVE-2022-21549)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Other Changes:
* Red Hat builds of OpenJDK now identify themselves as such in the version output of OpenJDK tools.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "The Red Hat build of OpenJDK 17 (java-17-openjdk) is now available for Windows.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The OpenJDK 17 packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit.\n\nThis release of the Red Hat build of OpenJDK 17 (17.0.4) for Windows\nserves as a replacement for the Red Hat build of OpenJDK 17 (17.0.3) and\nincludes security and bug fixes, and enhancements. For further information,\nrefer to the release notes linked to in the References section.\n\nSecurity Fix(es):\n\n* OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540)\n\n* OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541)\n\n* OpenJDK: integer truncation issue in Xalan (JAXP, 8285407) (CVE-2022-34169)\n\n* OpenJDK: random exponentials issue (Libraries, 8283875) (CVE-2022-21549)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nOther Changes:\n\n* Red Hat builds of OpenJDK now identify themselves as such in the version output of OpenJDK tools.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:5757", "url": "https://access.redhat.com/errata/RHSA-2022:5757" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "2108547", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108547" }, { "category": "external", "summary": "2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5757.json" } ], "title": "Red Hat Security Advisory: OpenJDK 17.0.4 security update for Windows Builds", "tracking": { "current_release_date": "2024-11-26T03:09:01+00:00", "generator": { "date": "2024-11-26T03:09:01+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2022:5757", "initial_release_date": "2022-07-28T15:45:58+00:00", "revision_history": [ { "date": "2022-07-28T15:45:58+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-07-28T15:45:58+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-26T03:09:01+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Build of OpenJDK 17.0.4", "product": { "name": "Red Hat Build of OpenJDK 17.0.4", "product_id": "Red Hat Build of OpenJDK 17.0.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:openjdk:17::windows" } } } ], "category": "product_family", "name": "OpenJDK" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21540", "cwe": { "id": "CWE-402", "name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108540" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: class compilation issue (Hotspot, 8281859)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Build of OpenJDK 17.0.4" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21540" }, { "category": "external", "summary": "RHBZ#2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21540", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21540" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-28T15:45:58+00:00", "details": "Before applying this update, make sure all previously-released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/openjdk/17/html/installing_and_using_openjdk_17_for_windows/index", "product_ids": [ "Red Hat Build of OpenJDK 17.0.4" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5757" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "Red Hat Build of OpenJDK 17.0.4" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: class compilation issue (Hotspot, 8281859)" }, { "cve": "CVE-2022-21541", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108543" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Build of OpenJDK 17.0.4" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21541" }, { "category": "external", "summary": "RHBZ#2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21541", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21541" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-28T15:45:58+00:00", "details": "Before applying this update, make sure all previously-released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/openjdk/17/html/installing_and_using_openjdk_17_for_windows/index", "product_ids": [ "Red Hat Build of OpenJDK 17.0.4" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5757" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat Build of OpenJDK 17.0.4" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)" }, { "cve": "CVE-2022-21549", "cwe": { "id": "CWE-1068", "name": "Inconsistency Between Implementation and Documented Design" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108547" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 17.0.3.1; Oracle GraalVM Enterprise Edition: 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: random exponentials issue (Libraries, 8283875)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Build of OpenJDK 17.0.4" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21549" }, { "category": "external", "summary": "RHBZ#2108547", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108547" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21549", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21549" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21549", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21549" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-28T15:45:58+00:00", "details": "Before applying this update, make sure all previously-released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/openjdk/17/html/installing_and_using_openjdk_17_for_windows/index", "product_ids": [ "Red Hat Build of OpenJDK 17.0.4" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5757" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "Red Hat Build of OpenJDK 17.0.4" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: random exponentials issue (Libraries, 8283875)" }, { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108554" } ], "notes": [ { "category": "description", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Build of OpenJDK 17.0.4" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "RHBZ#2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-34169", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-28T15:45:58+00:00", "details": "Before applying this update, make sure all previously-released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/documentation/en-us/openjdk/17/html/installing_and_using_openjdk_17_for_windows/index", "product_ids": [ "Red Hat Build of OpenJDK 17.0.4" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5757" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat Build of OpenJDK 17.0.4" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)" } ] }
rhsa-2024_10207
Vulnerability from csaf_redhat
Published
2024-11-25 00:12
Modified
2024-12-17 23:06
Summary
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.11 Security update
Notes
Topic
A security update is now available for Red Hat JBoss Enterprise Application Platform 7.3 for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 7.3.11 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.3.10, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.3.11 Release Notes for information about the most significant bug fixes and enhancements included in this release.
Security Fix(es):
* cxf-core: Apache CXF SSRF Vulnerability using the Aegis databinding [eap-7.3.z] (CVE-2024-28752)
* h2: Loading of custom classes from remote servers through JNDI [eap-7.3.z] (CVE-2022-23221)
* log4j: Unsafe deserialization flaw in Chainsaw log viewer [eap-7.3.z] (CVE-2022-23307)
* log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender [eap-7.3.z] (CVE-2022-23305)
* log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender [eap-7.3.z] (CVE-2021-4104)
* CXF: Apache CXF: SSRF Vulnerability [eap-7.3.z] (CVE-2022-46364)
* log4j: log4j1-chainsaw, log4j1-socketappender: DoS via hashmap logging [eap-7.3.z] (CVE-2023-26464)
* xalan: integer truncation issue in Xalan-J (JAXP, 8285407) [eap-7.3.z] (CVE-2022-34169)
* xnio: StackOverflowException when the chain of notifier states becomes problematically big [eap-7.3.z] (CVE-2023-5685)
* hsqldb: Untrusted input may lead to RCE attack [eap-7.3.z] (CVE-2022-41853)
* server: eap-7: heap exhaustion via deserialization [eap-7.3.z] (CVE-2023-3171)
* avro: apache-avro: Apache Avro Java SDK: Memory when deserializing untrusted data in Avro Java SDK [eap-7.3.z] (CVE-2023-39410)
* undertow: client side invocation timeout raised when calling EJB over HTTP and HTTP2 [eap-7.3.z] (CVE-2021-3859)
* avro: apache-avro: Schema parsing may trigger Remote Code Execution (RCE) [eap-7.3.z] (CVE-2024-47561)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgements, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "A security update is now available for Red Hat JBoss Enterprise Application Platform 7.3 for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 7.3.11 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.3.10, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.3.11 Release Notes for information about the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* cxf-core: Apache CXF SSRF Vulnerability using the Aegis databinding [eap-7.3.z] (CVE-2024-28752)\n\n* h2: Loading of custom classes from remote servers through JNDI [eap-7.3.z] (CVE-2022-23221)\n\n* log4j: Unsafe deserialization flaw in Chainsaw log viewer [eap-7.3.z] (CVE-2022-23307)\n\n* log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender [eap-7.3.z] (CVE-2022-23305)\n\n* log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender [eap-7.3.z] (CVE-2021-4104)\n\n* CXF: Apache CXF: SSRF Vulnerability [eap-7.3.z] (CVE-2022-46364)\n\n* log4j: log4j1-chainsaw, log4j1-socketappender: DoS via hashmap logging [eap-7.3.z] (CVE-2023-26464)\n\n* xalan: integer truncation issue in Xalan-J (JAXP, 8285407) [eap-7.3.z] (CVE-2022-34169)\n\n* xnio: StackOverflowException when the chain of notifier states becomes problematically big [eap-7.3.z] (CVE-2023-5685)\n\n* hsqldb: Untrusted input may lead to RCE attack [eap-7.3.z] (CVE-2022-41853)\n\n* server: eap-7: heap exhaustion via deserialization [eap-7.3.z] (CVE-2023-3171)\n\n* avro: apache-avro: Apache Avro Java SDK: Memory when deserializing untrusted data in Avro Java SDK [eap-7.3.z] (CVE-2023-39410)\n\n* undertow: client side invocation timeout raised when calling EJB over HTTP and HTTP2 [eap-7.3.z] (CVE-2021-3859)\n\n* avro: apache-avro: Schema parsing may trigger Remote Code Execution (RCE) [eap-7.3.z] (CVE-2024-47561)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgements, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:10207", "url": "https://access.redhat.com/errata/RHSA-2024:10207" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.3", "url": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.3" }, { "category": "external", "summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.3/html-single/installation_guide/index", "url": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.3/html-single/installation_guide/index" }, { "category": "external", "summary": "2010378", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010378" }, { "category": "external", "summary": "2031667", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031667" }, { "category": "external", "summary": "2041959", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041959" }, { "category": "external", "summary": "2041967", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041967" }, { "category": "external", "summary": "2044596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044596" }, { "category": "external", "summary": "2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "2136141", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2136141" }, { "category": "external", "summary": "2155682", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2155682" }, { "category": "external", "summary": "2182864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182864" }, { "category": "external", "summary": "2213639", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2213639" }, { "category": "external", "summary": "2241822", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241822" }, { "category": "external", "summary": "2242521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242521" }, { "category": "external", "summary": "2270732", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270732" }, { "category": "external", "summary": "2316116", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2316116" }, { "category": "external", "summary": "JBEAP-23025", "url": "https://issues.redhat.com/browse/JBEAP-23025" }, { "category": "external", "summary": "JBEAP-28084", "url": "https://issues.redhat.com/browse/JBEAP-28084" }, { "category": "external", "summary": "JBEAP-28089", "url": "https://issues.redhat.com/browse/JBEAP-28089" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_10207.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.11 Security update", "tracking": { "current_release_date": "2024-12-17T23:06:37+00:00", "generator": { "date": "2024-12-17T23:06:37+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2024:10207", "initial_release_date": "2024-11-25T00:12:17+00:00", "revision_history": [ { "date": "2024-11-25T00:12:17+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-11-25T00:12:17+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T23:06:37+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product": { "name": "Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform_eus:7.3::el7" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" }, { "branches": [ { "category": "product_version", "name": "eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "product": { "name": "eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "product_id": "eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-marshalling@2.0.15-1.Final_redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "product": { "name": "eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "product_id": "eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-apache-cxf@3.4.10-1.SP1_redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "product": { "name": "eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "product_id": "eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-xnio-base@3.7.13-1.Final_redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "product": { "name": "eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "product_id": "eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-avro@1.7.6-8.redhat_00003.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "product": { "name": "eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "product_id": "eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wss4j@2.3.3-2.redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src", "product": { "name": "eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src", "product_id": "eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-xml-security@2.2.3-2.redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "product": { "name": "eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "product_id": "eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-xalan-j2@2.7.1-38.redhat_00015.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "product": { "name": "eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "product_id": "eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-log4j-jboss-logmanager@1.2.2-2.Final_redhat_00002.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "product": { "name": "eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "product_id": "eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-h2database@1.4.197-3.redhat_00004.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "product": { "name": "eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "product_id": "eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-annotations-api_1.3_spec@2.0.1-4.Final_redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "product": { "name": "eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "product_id": "eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration@1.7.2-12.Final_redhat_00013.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "product": { "name": "eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "product_id": "eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly@7.3.11-4.GA_redhat_00002.1.el7eap?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-marshalling@2.0.15-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-marshalling-river@2.0.15-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "product_id": "eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-apache-cxf@3.4.10-1.SP1_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "product_id": "eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-apache-cxf-rt@3.4.10-1.SP1_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "product_id": "eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-apache-cxf-services@3.4.10-1.SP1_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "product_id": "eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-apache-cxf-tools@3.4.10-1.SP1_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-xnio-base@3.7.13-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "product": { "name": "eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "product_id": "eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-avro@1.7.6-8.redhat_00003.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "product_id": "eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wss4j@2.3.3-2.redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "product_id": "eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wss4j-bindings@2.3.3-2.redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "product_id": "eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wss4j-policy@2.3.3-2.redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "product_id": "eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wss4j-ws-security-common@2.3.3-2.redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "product_id": "eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wss4j-ws-security-dom@2.3.3-2.redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "product_id": "eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wss4j-ws-security-policy-stax@2.3.3-2.redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "product_id": "eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wss4j-ws-security-stax@2.3.3-2.redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "product_id": "eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-xml-security@2.2.3-2.redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "product": { "name": "eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "product_id": "eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-xalan-j2@2.7.1-38.redhat_00015.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "product": { "name": "eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "product_id": "eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-log4j-jboss-logmanager@1.2.2-2.Final_redhat_00002.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "product": { "name": "eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "product_id": "eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-h2database@1.4.197-3.redhat_00004.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-annotations-api_1.3_spec@2.0.1-4.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration@1.7.2-12.Final_redhat_00013.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-cli@1.7.2-12.Final_redhat_00013.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-core@1.7.2-12.Final_redhat_00013.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-eap6.4@1.7.2-12.Final_redhat_00013.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-eap6.4-to-eap7.3@1.7.2-12.Final_redhat_00013.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-eap7.0@1.7.2-12.Final_redhat_00013.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-eap7.1@1.7.2-12.Final_redhat_00013.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-eap7.2@1.7.2-12.Final_redhat_00013.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-eap7.2-to-eap7.3@1.7.2-12.Final_redhat_00013.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-eap7.3-server@1.7.2-12.Final_redhat_00013.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly10.0@1.7.2-12.Final_redhat_00013.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly10.1@1.7.2-12.Final_redhat_00013.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly11.0@1.7.2-12.Final_redhat_00013.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly12.0@1.7.2-12.Final_redhat_00013.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly13.0-server@1.7.2-12.Final_redhat_00013.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly14.0-server@1.7.2-12.Final_redhat_00013.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly15.0-server@1.7.2-12.Final_redhat_00013.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly16.0-server@1.7.2-12.Final_redhat_00013.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly17.0-server@1.7.2-12.Final_redhat_00013.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly18.0-server@1.7.2-12.Final_redhat_00013.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly8.2@1.7.2-12.Final_redhat_00013.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly9.0@1.7.2-12.Final_redhat_00013.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "product": { "name": "eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "product_id": "eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly@7.3.11-4.GA_redhat_00002.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "product": { "name": "eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "product_id": "eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk11@7.3.11-4.GA_redhat_00002.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "product": { "name": "eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "product_id": "eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk8@7.3.11-4.GA_redhat_00002.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "product": { "name": "eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "product_id": "eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-javadocs@7.3.11-4.GA_redhat_00002.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "product": { "name": "eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "product_id": "eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-modules@7.3.11-4.GA_redhat_00002.1.el7eap?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch" }, "product_reference": "eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src" }, "product_reference": "eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch" }, "product_reference": "eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src" }, "product_reference": "eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src" }, "product_reference": "eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch" }, "product_reference": "eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src" }, "product_reference": "eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch" }, "product_reference": "eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src" }, "product_reference": "eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch" }, "product_reference": "eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch" }, "product_reference": "eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch" }, "product_reference": "eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch" }, "product_reference": "eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src" }, "product_reference": "eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch" }, "product_reference": "eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src" }, "product_reference": "eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src as a component of Red Hat JBoss Enterprise Application Platform 7.3 EUS for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" }, "product_reference": "eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.3-EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-3859", "cwe": { "id": "CWE-214", "name": "Invocation of Process Using Visible Sensitive Information" }, "discovery_date": "2021-09-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2010378" } ], "notes": [ { "category": "description", "text": "A flaw was found in Undertow that tripped the client-side invocation timeout with certain calls made over HTTP2. This flaw allows an attacker to carry out denial of service attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "undertow: client side invocation timeout raised when calling over HTTP2", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform\u0027s OpenDaylight will not be updated for this flaw because it was deprecated as of OpenStack Platform 14 and is only receiving security fixes for Critical flaws.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3859" }, { "category": "external", "summary": "RHBZ#2010378", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010378" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3859", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3859" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3859", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3859" } ], "release_date": "2022-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-25T00:12:17+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:10207" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "undertow: client side invocation timeout raised when calling over HTTP2" }, { "cve": "CVE-2021-4104", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-12-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2031667" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Java logging library Apache Log4j in version 1.x. JMSAppender in Log4j 1.x is vulnerable to deserialization of untrusted data. This allows a remote attacker to execute code on the server if the deployed application is configured to use JMSAppender and to the attacker\u0027s JNDI LDAP endpoint.", "title": "Vulnerability description" }, { "category": "summary", "text": "log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender", "title": "Vulnerability summary" }, { "category": "other", "text": "Based on the conditions to be exploitable (see details below), the risk is much lower than Log4j 2.x and Red Hat has assessed this to be Moderate severity. This flaw has been filed for Log4j 1.x, and the corresponding flaw information for Log4j 2.x is available at: https://access.redhat.com/security/cve/CVE-2021-44228\n\nNote this flaw ONLY affects applications which are specifically configured to use JMSAppender, which is not the default, or when the attacker has write access to the Log4j configuration for adding JMSAppender to the attacker\u0027s JNDI LDAP endpoint. \n\nIf the Log4j configuration is set TopicBindingName or TopicConnectionFactoryBindingName configurations allowing JMSAppender to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-44228 Log4j 2.x, Log4j 1.x is vulnerable. However, the attack vector is reduced as it depends on having write access, which is not a standard configuration rather than untrusted user input. These are sufficient factors beyond the attacker\u0027s control.\n\nThe tomcat package shipped with Red Hat Enterprise Linux does not include log4j but it does include a default configuration for log4j, log4j.properties, which could be used with tomcat if users choose to install and configure the library. The JMSAppender is not enabled by default, and the permissions of the file can only be modified as root.\n\nRed Hat Virtualization ships log4j12-1.2.17, but it is used and configured in a way which makes this flaw not possible to exploit. Therefore impact is rated Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-4104" }, { "category": "external", "summary": "RHBZ#2031667", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031667" }, { "category": "external", "summary": "RHSB-2021-009", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2021-009" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4104", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4104" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4104", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4104" }, { "category": "external", "summary": "https://github.com/apache/logging-log4j2/pull/608#issuecomment-990494126", "url": "https://github.com/apache/logging-log4j2/pull/608#issuecomment-990494126" }, { "category": "external", "summary": "https://github.com/apache/logging-log4j2/pull/608#issuecomment-991723301", "url": "https://github.com/apache/logging-log4j2/pull/608#issuecomment-991723301" }, { "category": "external", "summary": "https://lists.apache.org/thread/0x4zvtq92yggdgvwfgsftqrj4xx5w0nx", "url": "https://lists.apache.org/thread/0x4zvtq92yggdgvwfgsftqrj4xx5w0nx" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2021/12/13/1", "url": "https://www.openwall.com/lists/oss-security/2021/12/13/1" } ], "release_date": "2021-12-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-25T00:12:17+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:10207" }, { "category": "workaround", "details": "These are the possible mitigations for this flaw for releases version 1.x:\n\n- Comment out or remove JMSAppender in the Log4j configuration if it is used\n- Remove the JMSAppender class from the classpath. For example:\n```\nzip -q -d log4j-*.jar org/apache/log4j/net/JMSAppender.class\n```\n- Restrict access for the OS user on the platform running the application to prevent modifying the Log4j configuration by the attacker.", "product_ids": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender" }, { "cve": "CVE-2022-23221", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2022-01-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2044596" } ], "notes": [ { "category": "description", "text": "A flaw was found in the H2 Console. This flaw allows remote attackers to execute arbitrary code via a JDBC URL, concatenating with a substring that allows remote code execution by using a script.", "title": "Vulnerability description" }, { "category": "summary", "text": "h2: Loading of custom classes from remote servers through JNDI", "title": "Vulnerability summary" }, { "category": "other", "text": "In OpenShift Container Platform (OCP) the openshift-enterprise-3.11/metrics-hawkular-metrics-container container image ships a vulnerable version of h2 as part of the underlying images, but as it uses standard configuration and Console is not enabled/started by default, therefore the impact by this vulnerability is LOW and will not be fixed as OCP 3.x has already reached End of Full Support.\n\n[1] https://access.redhat.com/support/policy/updates/openshift_noncurrent", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23221" }, { "category": "external", "summary": "RHBZ#2044596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044596" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23221", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23221" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23221", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23221" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-45hx-wfhj-473x", "url": "https://github.com/advisories/GHSA-45hx-wfhj-473x" } ], "release_date": "2022-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-25T00:12:17+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:10207" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "h2: Loading of custom classes from remote servers through JNDI" }, { "cve": "CVE-2022-23305", "cwe": { "id": "CWE-89", "name": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)" }, "discovery_date": "2022-01-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2041959" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Java logging library Apache Log4j in version 1.x. JDBCAppender in Log4j 1.x is vulnerable to SQL injection in untrusted data. This allows a remote attacker to run SQL statements in the database if the deployed application is configured to use JDBCAppender with certain interpolation tokens.", "title": "Vulnerability description" }, { "category": "summary", "text": "log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender", "title": "Vulnerability summary" }, { "category": "other", "text": "Note this issue only affects Log4j 1.x when specifically configured to use the JDBCAppender, which is not the default.\n\nRed Hat Satellite bundles log4j-over-slf4j with Candlepin, however, product is not affected as it uses logback framework for logging.\n\nRed Hat Virtualization and OpenShift Container Platform in the OCP Metering stack (the Hive/Presto/Hadoop components) ship a vulnerable version of the log4j package, however JDBCAppender is not used. Therefore the impact of this vulnerability for these products is rated Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23305" }, { "category": "external", "summary": "RHBZ#2041959", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041959" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23305", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23305" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23305", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23305" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2022/01/18/4", "url": "https://www.openwall.com/lists/oss-security/2022/01/18/4" } ], "release_date": "2022-01-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-25T00:12:17+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:10207" }, { "category": "workaround", "details": "These are the possible mitigations for this flaw for releases version 1.x:\n\n- Comment out or remove JDBCAppender in the Log4j configuration if it is used\n- Remove the JDBCAppender class from the server\u0027s jar files. For example:\n```\nzip -q -d log4j-*.jar org/apache/log4j/jdbc/JDBCAppender.class\n```", "product_ids": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender" }, { "cve": "CVE-2022-23307", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2022-01-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2041967" } ], "notes": [ { "category": "description", "text": "A flaw was found in the log4j 1.x chainsaw component, where the contents of certain log entries are deserialized and possibly permit code execution. This flaw allows an attacker to send a malicious request with serialized data to the server to be deserialized when the chainsaw component is run.", "title": "Vulnerability description" }, { "category": "summary", "text": "log4j: Unsafe deserialization flaw in Chainsaw log viewer", "title": "Vulnerability summary" }, { "category": "other", "text": "Chainsaw is a standalone graphical user interface for viewing log entries in log4j. This flaw may be bypassed by using other available means to access log entries.\n\nRed Hat Satellite bundles log4j-over-slf4j with Candlepin, however, product is not affected as it uses logback framework for logging.\n\nRed Hat Virtualization ships a vulnerable version of the log4j package, however chainsaw is not part of typical use cases. An attacker looking to exploit this would need to not only be able to generate a malicious log entry, but also have the necessary access and permissions to start chainsaw on the engine node. Therefore the impact of this vulnerability for Red Hat Virtualization is rated Low.\n\nSimilar to Red Hat Virtualization in OpenShift Container Platform (OCP), the Hive/Presto/Hadoop components that comprise the OCP Metering stack, ship the vulnerable version of log4j package, however vulnerable chainsaw component is not used by default. Therefore the impact to OCP is reduced to Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23307" }, { "category": "external", "summary": "RHBZ#2041967", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041967" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23307", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23307" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23307", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23307" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2022/01/18/5", "url": "https://www.openwall.com/lists/oss-security/2022/01/18/5" } ], "release_date": "2022-01-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-25T00:12:17+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:10207" }, { "category": "workaround", "details": "These are the mitigations available for this flaw for log4j 1.x:\n- Avoid using Chainsaw to view logs, and instead use some other utility, especially if there is a log view available within the product itself.\n- Remove the Chainsaw classes from the log4j jar files. For example:\n```\nzip -q -d log4j-*.jar org/apache/log4j/chainsaw/*\n```\n(log4j jars may be nested in zip archives within product)", "product_ids": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "log4j: Unsafe deserialization flaw in Chainsaw log viewer" }, { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108554" } ], "notes": [ { "category": "description", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "RHBZ#2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-34169", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-25T00:12:17+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:10207" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)" }, { "cve": "CVE-2022-41853", "cwe": { "id": "CWE-470", "name": "Use of Externally-Controlled Input to Select Classes or Code (\u0027Unsafe Reflection\u0027)" }, "discovery_date": "2022-10-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2136141" } ], "notes": [ { "category": "description", "text": "A flaw was found in the HSQLDB package. This flaw allows untrusted inputs to execute remote code due to any static method of any Java class in the classpath, resulting in code execution by default.", "title": "Vulnerability description" }, { "category": "summary", "text": "hsqldb: Untrusted input may lead to RCE attack", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-41853" }, { "category": "external", "summary": "RHBZ#2136141", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2136141" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-41853", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41853" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41853", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41853" }, { "category": "external", "summary": "http://hsqldb.org/doc/2.0/guide/sqlroutines-chapt.html#src_jrt_access_control", "url": "http://hsqldb.org/doc/2.0/guide/sqlroutines-chapt.html#src_jrt_access_control" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-77xx-rxvh-q682", "url": "https://github.com/advisories/GHSA-77xx-rxvh-q682" } ], "release_date": "2022-10-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-25T00:12:17+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:10207" }, { "category": "workaround", "details": "By default, the static methods of any class that is on the classpath are available for use and can compromise security in some systems. The optional Java system property, hsqldb.method_class_names, allows preventing access to classes other than java.lang.Math or specifying a semicolon-separated list of allowed classes. A property value that ends with .* is treated as a wild card and allows access to all class or method names formed by substitution of the * (asterisk).\n\nIn the example below, the property has been included as an argument to the Java command.\n\n java -Dhsqldb.method_class_names=\"org.me.MyClass;org.you.YourClass;org.you.lib.*\" [the rest of the command line]\n\nThe above example allows access to the methods in the two classes: org.me.MyClass and org.you.YourClass together with all the classes in the org.you.lib package. Note that if the property is not defined, no access control is performed at this level.\n\nThe user who creates a Java routine must have the relevant access privileges on the tables that are used inside the Java method.\n\nOnce the routine has been defined, the normal database access control applies to its user. The routine can be executed only by those users who have been granted EXECUTE privileges on it. Access to routines can be granted to users with GRANT EXECUTE or GRANT ALL. For example, GRANT EXECUTE ON myroutine TO PUBLIC.\n\nIn hsqldb 2.7.1, all classes by default are not accessible, except those in java.lang.Math and need to be manually enabled.", "product_ids": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "hsqldb: Untrusted input may lead to RCE attack" }, { "cve": "CVE-2022-46364", "cwe": { "id": "CWE-918", "name": "Server-Side Request Forgery (SSRF)" }, "discovery_date": "2022-12-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2155682" } ], "notes": [ { "category": "description", "text": "A SSRF vulnerability was found in Apache CXF. This issue occurs when parsing the href attribute of XOP:Include in MTOM requests, allowing an attacker to perform SSRF style attacks on webservices that take at least one parameter of any type.", "title": "Vulnerability description" }, { "category": "summary", "text": "CXF: SSRF Vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Integration Camel Quarkus does not support CXF extensions and so is affected at a reduced impact of Moderate.\nThe RHSSO server does not ship Apache CXF. The component mentioned in CVE-2022-46364 is a transitive dependency coming from Fuse adapters and the test suite.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-46364" }, { "category": "external", "summary": "RHBZ#2155682", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2155682" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-46364", "url": "https://www.cve.org/CVERecord?id=CVE-2022-46364" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46364", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46364" }, { "category": "external", "summary": "https://cxf.apache.org/security-advisories.data/CVE-2022-46364.txt?version=1\u0026modificationDate=1670944472739\u0026api=v2", "url": "https://cxf.apache.org/security-advisories.data/CVE-2022-46364.txt?version=1\u0026modificationDate=1670944472739\u0026api=v2" } ], "release_date": "2022-12-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-25T00:12:17+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:10207" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "CXF: SSRF Vulnerability" }, { "cve": "CVE-2023-3171", "cwe": { "id": "CWE-789", "name": "Memory Allocation with Excessive Size Value" }, "discovery_date": "2023-04-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2213639" } ], "notes": [ { "category": "description", "text": "A flaw was found in EAP-7 during deserialization of certain classes, which permits instantiation of HashMap and HashTable with no checks on resources consumed. This issue could allow an attacker to submit malicious requests using these classes, which could eventually exhaust the heap and result in a Denial of Service.", "title": "Vulnerability description" }, { "category": "summary", "text": "eap-7: heap exhaustion via deserialization", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-3171" }, { "category": "external", "summary": "RHBZ#2213639", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2213639" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-3171", "url": "https://www.cve.org/CVERecord?id=CVE-2023-3171" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-3171", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-3171" } ], "release_date": "2023-10-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-25T00:12:17+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:10207" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "eap-7: heap exhaustion via deserialization" }, { "cve": "CVE-2023-5685", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2023-10-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241822" } ], "notes": [ { "category": "description", "text": "A flaw was found in XNIO. The XNIO NotifierState that can cause a Stack Overflow Exception when the chain of notifier states becomes problematically large can lead to uncontrolled resource management and a possible denial of service (DoS).", "title": "Vulnerability description" }, { "category": "summary", "text": "xnio: StackOverflowException when the chain of notifier states becomes problematically big", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat rates this vulnerability as an Important impact as the uncontrolled resource consumption may lead to Denial of Service (DoS). This might be intentioned by an attacker who is looking to jeopardize an environment.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-5685" }, { "category": "external", "summary": "RHBZ#2241822", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241822" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-5685", "url": "https://www.cve.org/CVERecord?id=CVE-2023-5685" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-5685", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5685" } ], "release_date": "2024-03-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-25T00:12:17+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:10207" }, { "category": "workaround", "details": "There is currently no mitigation available for this vulnerability. Please keep the packages up-to-date as the updates become available.", "product_ids": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "xnio: StackOverflowException when the chain of notifier states becomes problematically big" }, { "cve": "CVE-2023-26464", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2023-03-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2182864" } ], "notes": [ { "category": "description", "text": "A flaw was found in Chainsaw and SocketAppender components with Log4j 1.x on JRE, less than 1.7. This issue may allow an attacker to use a logging entry with a specially-crafted hashmap or hashtable, depending on which logging component is in use, to process and exhaust the available memory in the virtual machine, resulting in a Denial of Service when the object is deserialized. This issue affects Apache Log4j before version 2.", "title": "Vulnerability description" }, { "category": "summary", "text": "log4j1-socketappender: DoS via hashmap logging", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 8 and 9 security impacts have been reduced to Low as they do not enable the vulnerable JDK by default.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-26464" }, { "category": "external", "summary": "RHBZ#2182864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182864" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-26464", "url": "https://www.cve.org/CVERecord?id=CVE-2023-26464" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-26464", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-26464" }, { "category": "external", "summary": "https://www.ibm.com/support/pages/security-bulletin-vulnerability-log4j-1216jar-affect-ibm-operations-analytics-log-analysis-cve-2023-26464", "url": "https://www.ibm.com/support/pages/security-bulletin-vulnerability-log4j-1216jar-affect-ibm-operations-analytics-log-analysis-cve-2023-26464" } ], "release_date": "2023-03-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-25T00:12:17+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:10207" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "log4j1-socketappender: DoS via hashmap logging" }, { "cve": "CVE-2023-39410", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2023-10-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2242521" } ], "notes": [ { "category": "description", "text": "A flaw was found in apache-avro. When deserializing untrusted or corrupted data, it is possible for a reader to consume memory beyond the allowed constraints, leading to an out-of-memory error and a denial of service on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-avro: Apache Avro Java SDK: Memory when deserializing untrusted data in Avro Java SDK", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-39410" }, { "category": "external", "summary": "RHBZ#2242521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242521" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-39410", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39410" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39410", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39410" }, { "category": "external", "summary": "https://issues.apache.org/jira/browse/AVRO-3819", "url": "https://issues.apache.org/jira/browse/AVRO-3819" } ], "release_date": "2023-09-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-25T00:12:17+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:10207" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "apache-avro: Apache Avro Java SDK: Memory when deserializing untrusted data in Avro Java SDK" }, { "cve": "CVE-2024-28752", "cwe": { "id": "CWE-918", "name": "Server-Side Request Forgery (SSRF)" }, "discovery_date": "2024-03-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2270732" } ], "notes": [ { "category": "description", "text": "A server-side request forgery (SSRF) vulnerability was found in Apache CXF. This issue occurs in attacks on webservices that take at least one parameter of any type, and when Aegisdatabind is used. Users of other data bindings including the default databinding are not impacted.", "title": "Vulnerability description" }, { "category": "summary", "text": "cxf-core: Apache CXF SSRF Vulnerability using the Aegis databinding", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat rates this as an Important impact due to the fact this requires Aegis databind, which is not the default databinding for Apache CXF.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-28752" }, { "category": "external", "summary": "RHBZ#2270732", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270732" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-28752", "url": "https://www.cve.org/CVERecord?id=CVE-2024-28752" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-28752", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-28752" }, { "category": "external", "summary": "https://cxf.apache.org/security-advisories.data/CVE-2024-28752.txt", "url": "https://cxf.apache.org/security-advisories.data/CVE-2024-28752.txt" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-qmgx-j96g-4428", "url": "https://github.com/advisories/GHSA-qmgx-j96g-4428" } ], "release_date": "2024-03-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-25T00:12:17+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:10207" }, { "category": "workaround", "details": "No mitigation is currently available for this vulnerability. Please make sure to update as the fixes become available.", "product_ids": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "cxf-core: Apache CXF SSRF Vulnerability using the Aegis databinding" }, { "cve": "CVE-2024-47561", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2024-10-02T14:04:06.018000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2316116" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Apache Avro. The project is affected and at risk if it accepts an org.apache.Avro/avroAvro schema for parsing provided by an end user. This flaw allows an attacker to trigger remote code execution by using the special \"java-class\" attribute.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-avro: Schema parsing may trigger Remote Code Execution (RCE)", "title": "Vulnerability summary" }, { "category": "other", "text": "The Red Hat build of Apache Camel K 1.10 was rated Important as it allows users to provide an Avro schema for parsing. Note that this functionality is limited to authenticated users.\n\nRed Hat Single Sign-On 7 ships the affected component in its maven repository but does not use it in the product. As such it is affected but not vulnerable to the flaw, and is assessed at Moderate security impact.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-47561" }, { "category": "external", "summary": "RHBZ#2316116", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2316116" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-47561", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47561" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47561", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47561" } ], "release_date": "2024-10-03T12:20:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-25T00:12:17+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:10207" }, { "category": "workaround", "details": "1. Avoid parsing user-provided schemas.\n2. Ensure proper input validation and sanitization of schemas before parsing.\n3. Monitor systems for any unusual activities that may indicate exploitation attempts.\n4. Apply the principle of least privilege to minimize the potential impact of successful exploits.", "product_ids": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-0:3.4.10-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-rt-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-services-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-apache-cxf-tools-0:3.4.10-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-avro-0:1.7.6-8.redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-h2database-0:1.4.197-3.redhat_00004.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-annotations-api_1.3_spec-0:2.0.1-4.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-0:2.0.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-marshalling-river-0:2.0.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-0:1.7.2-12.Final_redhat_00013.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-cli-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-core-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-12.Final_redhat_00013.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-jboss-xnio-base-0:3.7.13-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-log4j-jboss-logmanager-0:1.2.2-2.Final_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-0:7.3.11-4.GA_redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk11-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-java-jdk8-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-javadocs-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wildfly-modules-0:7.3.11-4.GA_redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-0:2.3.3-2.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-wss4j-bindings-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-policy-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-common-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-dom-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-policy-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-wss4j-ws-security-stax-0:2.3.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xalan-j2-0:2.7.1-38.redhat_00015.1.el7eap.src", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3-EUS:eap7-xml-security-0:2.2.3-2.redhat_00001.1.el7eap.src" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "apache-avro: Schema parsing may trigger Remote Code Execution (RCE)" } ] }
rhsa-2022_5700
Vulnerability from csaf_redhat
Published
2022-07-25 18:37
Modified
2024-11-26 03:08
Summary
Red Hat Security Advisory: java-1.8.0-openjdk security update
Notes
Topic
An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.
Security Fix(es):
* OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) (CVE-2022-34169)
* OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540)
* OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.\n\nSecurity Fix(es):\n\n* OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) (CVE-2022-34169)\n\n* OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540)\n\n* OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:5700", "url": "https://access.redhat.com/errata/RHSA-2022:5700" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5700.json" } ], "title": "Red Hat Security Advisory: java-1.8.0-openjdk security update", "tracking": { "current_release_date": "2024-11-26T03:08:20+00:00", "generator": { "date": "2024-11-26T03:08:20+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2022:5700", "initial_release_date": "2022-07-25T18:37:55+00:00", "revision_history": [ { "date": "2022-07-25T18:37:55+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-07-25T18:37:55+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-26T03:08:20+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:8.2::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.src", "product": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.src", "product_id": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk@1.8.0.342.b07-1.el8_2?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.aarch64", "product": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.aarch64", "product_id": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk@1.8.0.342.b07-1.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.aarch64", "product": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.aarch64", "product_id": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility@1.8.0.342.b07-1.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.aarch64", "product": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.aarch64", "product_id": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo@1.8.0.342.b07-1.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.aarch64", "product": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.aarch64", "product_id": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel@1.8.0.342.b07-1.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.aarch64", "product": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.aarch64", "product_id": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless@1.8.0.342.b07-1.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.aarch64", "product": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.aarch64", "product_id": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src@1.8.0.342.b07-1.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.aarch64", "product": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.aarch64", "product_id": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debugsource@1.8.0.342.b07-1.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "product": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "product_id": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debuginfo@1.8.0.342.b07-1.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "product": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "product_id": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-debuginfo@1.8.0.342.b07-1.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "product": { "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "product_id": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-slowdebug-debuginfo@1.8.0.342.b07-1.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "product": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "product_id": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-debuginfo@1.8.0.342.b07-1.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "product": { "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "product_id": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-slowdebug-debuginfo@1.8.0.342.b07-1.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "product": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "product_id": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-debuginfo@1.8.0.342.b07-1.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "product": { "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "product_id": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-slowdebug-debuginfo@1.8.0.342.b07-1.el8_2?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "product": { "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "product_id": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-slowdebug-debuginfo@1.8.0.342.b07-1.el8_2?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.ppc64le", "product": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.ppc64le", "product_id": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk@1.8.0.342.b07-1.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.ppc64le", "product": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.ppc64le", "product_id": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility@1.8.0.342.b07-1.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.ppc64le", "product": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.ppc64le", "product_id": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo@1.8.0.342.b07-1.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.ppc64le", "product": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.ppc64le", "product_id": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel@1.8.0.342.b07-1.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.ppc64le", "product": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.ppc64le", "product_id": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless@1.8.0.342.b07-1.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.ppc64le", "product": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.ppc64le", "product_id": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src@1.8.0.342.b07-1.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.ppc64le", "product": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.ppc64le", "product_id": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debugsource@1.8.0.342.b07-1.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "product": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "product_id": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debuginfo@1.8.0.342.b07-1.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "product": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "product_id": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-debuginfo@1.8.0.342.b07-1.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "product": { "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "product_id": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-slowdebug-debuginfo@1.8.0.342.b07-1.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "product": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "product_id": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-debuginfo@1.8.0.342.b07-1.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "product": { "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "product_id": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-slowdebug-debuginfo@1.8.0.342.b07-1.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "product": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "product_id": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-debuginfo@1.8.0.342.b07-1.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "product": { "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "product_id": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-slowdebug-debuginfo@1.8.0.342.b07-1.el8_2?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "product": { "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "product_id": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-slowdebug-debuginfo@1.8.0.342.b07-1.el8_2?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.x86_64", "product": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.x86_64", "product_id": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk@1.8.0.342.b07-1.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.x86_64", "product": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.x86_64", "product_id": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility@1.8.0.342.b07-1.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.x86_64", "product": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.x86_64", "product_id": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo@1.8.0.342.b07-1.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.x86_64", "product": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.x86_64", "product_id": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel@1.8.0.342.b07-1.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.x86_64", "product": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.x86_64", "product_id": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless@1.8.0.342.b07-1.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.x86_64", "product": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.x86_64", "product_id": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src@1.8.0.342.b07-1.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.x86_64", "product": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.x86_64", "product_id": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debugsource@1.8.0.342.b07-1.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "product": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "product_id": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debuginfo@1.8.0.342.b07-1.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "product": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "product_id": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-debuginfo@1.8.0.342.b07-1.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "product": { "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "product_id": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-slowdebug-debuginfo@1.8.0.342.b07-1.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "product": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "product_id": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-debuginfo@1.8.0.342.b07-1.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "product": { "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "product_id": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-slowdebug-debuginfo@1.8.0.342.b07-1.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "product": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "product_id": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-debuginfo@1.8.0.342.b07-1.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "product": { "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "product_id": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-slowdebug-debuginfo@1.8.0.342.b07-1.el8_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "product": { "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "product_id": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-slowdebug-debuginfo@1.8.0.342.b07-1.el8_2?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.s390x", "product": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.s390x", "product_id": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk@1.8.0.342.b07-1.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.s390x", "product": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.s390x", "product_id": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility@1.8.0.342.b07-1.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.s390x", "product": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.s390x", "product_id": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo@1.8.0.342.b07-1.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.s390x", "product": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.s390x", "product_id": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel@1.8.0.342.b07-1.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.s390x", "product": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.s390x", "product_id": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless@1.8.0.342.b07-1.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.s390x", "product": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.s390x", "product_id": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src@1.8.0.342.b07-1.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.s390x", "product": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.s390x", "product_id": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debugsource@1.8.0.342.b07-1.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "product": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "product_id": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debuginfo@1.8.0.342.b07-1.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "product": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "product_id": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo-debuginfo@1.8.0.342.b07-1.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "product": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "product_id": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel-debuginfo@1.8.0.342.b07-1.el8_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "product": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "product_id": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless-debuginfo@1.8.0.342.b07-1.el8_2?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_2.noarch", "product": { "name": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_2.noarch", "product_id": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-javadoc@1.8.0.342.b07-1.el8_2?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_2.noarch", "product": { "name": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_2.noarch", "product_id": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-javadoc-zip@1.8.0.342.b07-1.el8_2?arch=noarch\u0026epoch=1" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.aarch64" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.ppc64le" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.s390x" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.src as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.src" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.src", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.x86_64" }, "product_reference": "java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.aarch64" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.ppc64le" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.s390x" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.x86_64" }, "product_reference": "java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64" }, "product_reference": "java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.aarch64" }, "product_reference": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.ppc64le" }, "product_reference": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.s390x" }, "product_reference": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.x86_64" }, "product_reference": "java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.aarch64" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.s390x" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64" }, "product_reference": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x" }, "product_reference": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64" }, "product_reference": "java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.aarch64" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.s390x" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64" }, "product_reference": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x" }, "product_reference": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64" }, "product_reference": "java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.aarch64" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.s390x" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64" }, "product_reference": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x" }, "product_reference": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64" }, "product_reference": "java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_2.noarch" }, "product_reference": "java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_2.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_2.noarch" }, "product_reference": "java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_2.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64" }, "product_reference": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le" }, "product_reference": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64" }, "product_reference": "java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.aarch64" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.aarch64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.ppc64le" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.s390x" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.s390x", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.x86_64" }, "product_reference": "java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21540", "cwe": { "id": "CWE-402", "name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108540" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: class compilation issue (Hotspot, 8281859)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.src", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_2.noarch", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_2.noarch", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21540" }, { "category": "external", "summary": "RHBZ#2108540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21540", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21540" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21540" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-25T18:37:55+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.src", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_2.noarch", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_2.noarch", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5700" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.src", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_2.noarch", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_2.noarch", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: class compilation issue (Hotspot, 8281859)" }, { "cve": "CVE-2022-21541", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108543" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.src", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_2.noarch", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_2.noarch", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21541" }, { "category": "external", "summary": "RHBZ#2108543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21541", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21541" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21541" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-25T18:37:55+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.src", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_2.noarch", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_2.noarch", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5700" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.src", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_2.noarch", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_2.noarch", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)" }, { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108554" } ], "notes": [ { "category": "description", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.src", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_2.noarch", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_2.noarch", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "RHBZ#2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-34169", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-25T18:37:55+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of OpenJDK Java must be restarted for this update to take effect.", "product_ids": [ "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.src", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_2.noarch", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_2.noarch", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5700" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.src", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-accessibility-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-debugsource-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-demo-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-devel-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-headless-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-javadoc-1:1.8.0.342.b07-1.el8_2.noarch", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-javadoc-zip-1:1.8.0.342.b07-1.el8_2.noarch", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-slowdebug-debuginfo-1:1.8.0.342.b07-1.el8_2.x86_64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.aarch64", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.ppc64le", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.s390x", "AppStream-8.2.0.Z.EUS:java-1.8.0-openjdk-src-1:1.8.0.342.b07-1.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)" } ] }
rhsa-2024_8080
Vulnerability from csaf_redhat
Published
2024-10-14 18:07
Modified
2024-12-17 21:03
Summary
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.19 Security update
Notes
Topic
An update is now available for Red Hat JBoss Enterprise Application Platform 7.4.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 7.4.19 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.4.18, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.4.19 Release Notes for information about the most significant bug fixes and enhancements included in this release.
Security Fix(es):
* braces: fails to limit the number of characters it can handle [eap-7.4.z] (CVE-2024-4068)
* jose4j: denial of service via specially crafted JWE [eap-7.4.z] (CVE-2023-51775)
* wildfly-domain-http: wildfly: No timeout for EAP management interface may lead to Denial of Service (DoS) [eap-7.4.z] (CVE-2024-4029)
* xalan: integer truncation issue in Xalan-J (JAXP, 8285407) [eap-7.4.z] (CVE-2022-34169)
* org.jsoup/jsoup: The jsoup cleaner may incorrectly sanitize crafted XSS attempts if SafeList.preserveRelativeLinks is enabled [eap-7.4.z] (CVE-2022-36033)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgements, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat JBoss Enterprise Application Platform 7.4.\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 7.4.19 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.4.18, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.4.19 Release Notes for information about the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* braces: fails to limit the number of characters it can handle [eap-7.4.z] (CVE-2024-4068)\n\n* jose4j: denial of service via specially crafted JWE [eap-7.4.z] (CVE-2023-51775)\n\n* wildfly-domain-http: wildfly: No timeout for EAP management interface may lead to Denial of Service (DoS) [eap-7.4.z] (CVE-2024-4029)\n\n* xalan: integer truncation issue in Xalan-J (JAXP, 8285407) [eap-7.4.z] (CVE-2022-34169)\n\n* org.jsoup/jsoup: The jsoup cleaner may incorrectly sanitize crafted XSS attempts if SafeList.preserveRelativeLinks is enabled [eap-7.4.z] (CVE-2022-36033)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgements, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:8080", "url": "https://access.redhat.com/errata/RHSA-2024:8080" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4", "url": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4" }, { "category": "external", "summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/index", "url": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/index" }, { "category": "external", "summary": "2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "2127078", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2127078" }, { "category": "external", "summary": "2266921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266921" }, { "category": "external", "summary": "2278615", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278615" }, { "category": "external", "summary": "2280600", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280600" }, { "category": "external", "summary": "JBEAP-27357", "url": "https://issues.redhat.com/browse/JBEAP-27357" }, { "category": "external", "summary": "JBEAP-27548", "url": "https://issues.redhat.com/browse/JBEAP-27548" }, { "category": "external", "summary": "JBEAP-27613", "url": "https://issues.redhat.com/browse/JBEAP-27613" }, { "category": "external", "summary": "JBEAP-27658", "url": "https://issues.redhat.com/browse/JBEAP-27658" }, { "category": "external", "summary": "JBEAP-27700", "url": "https://issues.redhat.com/browse/JBEAP-27700" }, { "category": "external", "summary": "JBEAP-27701", "url": "https://issues.redhat.com/browse/JBEAP-27701" }, { "category": "external", "summary": "JBEAP-27713", "url": "https://issues.redhat.com/browse/JBEAP-27713" }, { "category": "external", "summary": "JBEAP-27714", "url": "https://issues.redhat.com/browse/JBEAP-27714" }, { "category": "external", "summary": "JBEAP-27715", "url": "https://issues.redhat.com/browse/JBEAP-27715" }, { "category": "external", "summary": "JBEAP-27746", "url": "https://issues.redhat.com/browse/JBEAP-27746" }, { "category": "external", "summary": "JBEAP-27747", "url": "https://issues.redhat.com/browse/JBEAP-27747" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8080.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.19 Security update", "tracking": { "current_release_date": "2024-12-17T21:03:32+00:00", "generator": { "date": "2024-12-17T21:03:32+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2024:8080", "initial_release_date": "2024-10-14T18:07:02+00:00", "revision_history": [ { "date": "2024-10-14T18:07:02+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-10-14T18:07:02+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T21:03:32+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 7", "product": { "name": "Red Hat JBoss Enterprise Application Platform 7", "product_id": "Red Hat JBoss Enterprise Application Platform 7", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:7.4" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108554" } ], "notes": [ { "category": "description", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "RHBZ#2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-34169", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-14T18:07:02+00:00", "details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "Red Hat JBoss Enterprise Application Platform 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8080" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat JBoss Enterprise Application Platform 7" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)" }, { "cve": "CVE-2022-36033", "cwe": { "id": "CWE-87", "name": "Improper Neutralization of Alternate XSS Syntax" }, "discovery_date": "2022-09-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2127078" } ], "notes": [ { "category": "description", "text": "A flaw was found in jsoup, a Java HTML parser built for HTML editing, cleaning, scraping, and Cross-site scripting (XSS) safety. An issue in jsoup may incorrectly sanitize HTML, including `javascript:` URL expressions, which could allow XSS attacks when a reader subsequently clicks that link. If the non-default `SafeList.preserveRelativeLinks` option is enabled, HTML, including `javascript:` URLs crafted with control characters, will not be sanitized. If the site that this HTML is published on does not set a Content Security Policy, an XSS attack is possible.", "title": "Vulnerability description" }, { "category": "summary", "text": "jsoup: The jsoup cleaner may incorrectly sanitize crafted XSS attempts if SafeList.preserveRelativeLinks is enabled", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-36033" }, { "category": "external", "summary": "RHBZ#2127078", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2127078" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-36033", "url": "https://www.cve.org/CVERecord?id=CVE-2022-36033" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-36033", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-36033" } ], "release_date": "2022-08-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-14T18:07:02+00:00", "details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "Red Hat JBoss Enterprise Application Platform 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8080" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "Red Hat JBoss Enterprise Application Platform 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jsoup: The jsoup cleaner may incorrectly sanitize crafted XSS attempts if SafeList.preserveRelativeLinks is enabled" }, { "cve": "CVE-2023-51775", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2024-02-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2266921" } ], "notes": [ { "category": "description", "text": "A flaw was found in the jose.4.j (jose4j) library. The JWE key management algorithms based on PBKDF2 require a JOSE Header Parameter called p2c (PBES2 Count). This parameter dictates the number of PBKDF2 iterations needed to derive a CEK wrapping key. Its primary purpose is to intentionally slow down the key derivation function, making password brute-force and dictionary attacks more resource-intensive. However, if an attacker sets the p2c parameter in JWE to a large number, it can cause high computational consumption, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "jose4j: denial of service via specially crafted JWE", "title": "Vulnerability summary" }, { "category": "other", "text": "The vulnerability in the jose4j library, where the \"p2c\" parameter in PBKDF2-based JWE key management algorithms can be manipulated to induce high computational consumption, is classified as moderate severity due to its potential impact on service availability and resource exhaustion. By setting a large value for \"p2c\", an attacker can force the server to perform an excessive number of PBKDF2 iterations during key derivation. This results in increased CPU and memory usage, potentially leading to degraded performance or temporary denial of service.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-51775" }, { "category": "external", "summary": "RHBZ#2266921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266921" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-51775", "url": "https://www.cve.org/CVERecord?id=CVE-2023-51775" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-51775", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-51775" } ], "release_date": "2024-02-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-14T18:07:02+00:00", "details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "Red Hat JBoss Enterprise Application Platform 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8080" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Red Hat JBoss Enterprise Application Platform 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Enterprise Application Platform 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jose4j: denial of service via specially crafted JWE" }, { "cve": "CVE-2024-4029", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2024-04-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2278615" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Wildfly\u2019s management interface. Due to the lack of limitation of sockets for the management interface, it may be possible to cause a denial of service hitting the nofile limit as there is no possibility to configure or set a maximum number of connections.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly: No timeout for EAP management interface may lead to Denial of Service (DoS)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat rates this as a Low impact since this requires high privileges to jeopardize the system. The management interface is normally internal/local only and not exposed externally.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-4029" }, { "category": "external", "summary": "RHBZ#2278615", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278615" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-4029", "url": "https://www.cve.org/CVERecord?id=CVE-2024-4029" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-4029", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4029" } ], "release_date": "2024-05-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-14T18:07:02+00:00", "details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "Red Hat JBoss Enterprise Application Platform 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8080" }, { "category": "workaround", "details": "Currently there is no available mitigation for this vulnerability. Please make sure to perform updates as they become available.", "product_ids": [ "Red Hat JBoss Enterprise Application Platform 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Enterprise Application Platform 7" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "wildfly: No timeout for EAP management interface may lead to Denial of Service (DoS)" }, { "cve": "CVE-2024-4068", "cwe": { "id": "CWE-1050", "name": "Excessive Platform Resource Consumption within a Loop" }, "discovery_date": "2024-05-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2280600" } ], "notes": [ { "category": "description", "text": "A flaw was found in the NPM package `braces.` It fails to limit the number of characters it can handle, which could lead to memory exhaustion. In `lib/parse.js,` if a malicious user sends \"imbalanced braces\" as input, the parsing will enter a loop, causing the program to start allocating heap memory without freeing it at any moment of the loop. Eventually, the JavaScript heap limit is reached, and the program will crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "braces: fails to limit the number of characters it can handle", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform 7" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-4068" }, { "category": "external", "summary": "RHBZ#2280600", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2280600" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-4068", "url": "https://www.cve.org/CVERecord?id=CVE-2024-4068" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-4068", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4068" }, { "category": "external", "summary": "https://devhub.checkmarx.com/cve-details/CVE-2024-4068/", "url": "https://devhub.checkmarx.com/cve-details/CVE-2024-4068/" }, { "category": "external", "summary": "https://github.com/micromatch/braces/blob/98414f9f1fabe021736e26836d8306d5de747e0d/lib/parse.js#L308", "url": "https://github.com/micromatch/braces/blob/98414f9f1fabe021736e26836d8306d5de747e0d/lib/parse.js#L308" }, { "category": "external", "summary": "https://github.com/micromatch/braces/issues/35", "url": "https://github.com/micromatch/braces/issues/35" } ], "release_date": "2024-03-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-14T18:07:02+00:00", "details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "Red Hat JBoss Enterprise Application Platform 7" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8080" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Red Hat JBoss Enterprise Application Platform 7" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Enterprise Application Platform 7" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "braces: fails to limit the number of characters it can handle" } ] }
rhsa-2024_8826
Vulnerability from csaf_redhat
Published
2024-11-04 20:56
Modified
2024-12-13 14:15
Summary
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.0.4 Security update
Notes
Topic
A security update is now available for Red Hat JBoss Enterprise Application Platform 8.0. Red Hat Product Security has rated
this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat JBoss Enterprise Application Platform 8 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 8.0.4 serves as a replacement for Red Hat JBoss Enterprise Application Platform 8.0.3, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 8.0.4 Release Notes for information about the most significant bug fixes and enhancements included in this release.
Security Fix(es):
* org.apache.cxf/cxf-rt-transports-http: unrestricted memory consumption in CXF HTTP clients [eap-8.0.z] (CVE-2024-41172)
* com.nimbusds/nimbus-jose-jwt: large JWE p2c header value causes Denial of Service [eap-8.0.z] (CVE-2023-52428)
* wildfly-domain-http: wildfly: No timeout for EAP management interface may lead to Denial of Service (DoS) [eap-8.0.z] (CVE-2024-4029)
* xalan: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) [eap-8.0.z] (CVE-2022-34169)
* org.keycloak/keycloak-services: Vulnerable Redirect URI Validation Results in Open Redirec [eap-8.0.z] (CVE-2024-8883)
* org.keycloak/keycloak-saml-core-public: Improper Verification of SAML Responses Leading to Privilege Escalation in Keycloak [eap-8.0.z] (CVE-2024-8698)
* org.keycloak/keycloak-saml-core: Improper Verification of SAML Responses Leading to Privilege Escalation in Keycloak [eap-8.0.z] (CVE-2024-8698)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "A security update is now available for Red Hat JBoss Enterprise Application Platform 8.0. Red Hat Product Security has rated\nthis update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Enterprise Application Platform 8 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 8.0.4 serves as a replacement for Red Hat JBoss Enterprise Application Platform 8.0.3, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 8.0.4 Release Notes for information about the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* org.apache.cxf/cxf-rt-transports-http: unrestricted memory consumption in CXF HTTP clients [eap-8.0.z] (CVE-2024-41172)\n\n* com.nimbusds/nimbus-jose-jwt: large JWE p2c header value causes Denial of Service [eap-8.0.z] (CVE-2023-52428)\n\n* wildfly-domain-http: wildfly: No timeout for EAP management interface may lead to Denial of Service (DoS) [eap-8.0.z] (CVE-2024-4029)\n\n* xalan: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) [eap-8.0.z] (CVE-2022-34169)\n\n* org.keycloak/keycloak-services: Vulnerable Redirect URI Validation Results in Open Redirec [eap-8.0.z] (CVE-2024-8883)\n\n* org.keycloak/keycloak-saml-core-public: Improper Verification of SAML Responses Leading to Privilege Escalation in Keycloak [eap-8.0.z] (CVE-2024-8698)\n\n* org.keycloak/keycloak-saml-core: Improper Verification of SAML Responses Leading to Privilege Escalation in Keycloak [eap-8.0.z] (CVE-2024-8698)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:8826", "url": "https://access.redhat.com/errata/RHSA-2024:8826" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/8.0", "url": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/8.0" }, { "category": "external", "summary": "2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "2278615", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278615" }, { "category": "external", "summary": "2298829", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2298829" }, { "category": "external", "summary": "2309764", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309764" }, { "category": "external", "summary": "2311641", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2311641" }, { "category": "external", "summary": "2312511", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2312511" }, { "category": "external", "summary": "JBEAP-24945", "url": "https://issues.redhat.com/browse/JBEAP-24945" }, { "category": "external", "summary": "JBEAP-25035", "url": "https://issues.redhat.com/browse/JBEAP-25035" }, { "category": "external", "summary": "JBEAP-27002", "url": "https://issues.redhat.com/browse/JBEAP-27002" }, { "category": "external", "summary": "JBEAP-27194", "url": "https://issues.redhat.com/browse/JBEAP-27194" }, { "category": "external", "summary": "JBEAP-27276", "url": "https://issues.redhat.com/browse/JBEAP-27276" }, { "category": "external", "summary": "JBEAP-27293", "url": "https://issues.redhat.com/browse/JBEAP-27293" }, { "category": "external", "summary": "JBEAP-27392", "url": "https://issues.redhat.com/browse/JBEAP-27392" }, { "category": "external", "summary": "JBEAP-27543", "url": "https://issues.redhat.com/browse/JBEAP-27543" }, { "category": "external", "summary": "JBEAP-27585", "url": "https://issues.redhat.com/browse/JBEAP-27585" }, { "category": "external", "summary": "JBEAP-27643", "url": "https://issues.redhat.com/browse/JBEAP-27643" }, { "category": "external", "summary": "JBEAP-27659", "url": "https://issues.redhat.com/browse/JBEAP-27659" }, { "category": "external", "summary": "JBEAP-27688", "url": "https://issues.redhat.com/browse/JBEAP-27688" }, { "category": "external", "summary": "JBEAP-27694", "url": "https://issues.redhat.com/browse/JBEAP-27694" }, { "category": "external", "summary": "JBEAP-27957", "url": "https://issues.redhat.com/browse/JBEAP-27957" }, { "category": "external", "summary": "JBEAP-28057", "url": "https://issues.redhat.com/browse/JBEAP-28057" }, { "category": "external", "summary": "JBEAP-28278", "url": "https://issues.redhat.com/browse/JBEAP-28278" }, { "category": "external", "summary": "JBEAP-28289", "url": "https://issues.redhat.com/browse/JBEAP-28289" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8826.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.0.4 Security update", "tracking": { "current_release_date": "2024-12-13T14:15:31+00:00", "generator": { "date": "2024-12-13T14:15:31+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2024:8826", "initial_release_date": "2024-11-04T20:56:02+00:00", "revision_history": [ { "date": "2024-11-04T20:56:02+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-11-04T20:56:02+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-13T14:15:31+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 8", "product": { "name": "Red Hat JBoss Enterprise Application Platform 8", "product_id": "Red Hat JBoss Enterprise Application Platform 8", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:8.0" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "discovery_date": "2022-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2108554" } ], "notes": [ { "category": "description", "text": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform 8" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-34169" }, { "category": "external", "summary": "RHBZ#2108554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-34169", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169" } ], "release_date": "2022-07-19T20:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-04T20:56:02+00:00", "details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "Red Hat JBoss Enterprise Application Platform 8" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8826" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat JBoss Enterprise Application Platform 8" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)" }, { "cve": "CVE-2023-52428", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2024-09-04T17:02:58.468000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2309764" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the Nimbus Jose JWT package. This issue could allow an attacker to use a malicious large JWE p2c header value for PasswordBasedDecrypter and cause a Denial of Service (DoS).", "title": "Vulnerability description" }, { "category": "summary", "text": "nimbus-jose-jwt: large JWE p2c header value causes Denial of Service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform 8" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-52428" }, { "category": "external", "summary": "RHBZ#2309764", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309764" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-52428", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52428" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-52428", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52428" } ], "release_date": "2024-02-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-04T20:56:02+00:00", "details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "Red Hat JBoss Enterprise Application Platform 8" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8826" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Enterprise Application Platform 8" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "nimbus-jose-jwt: large JWE p2c header value causes Denial of Service" }, { "cve": "CVE-2024-4029", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2024-04-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2278615" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Wildfly\u2019s management interface. Due to the lack of limitation of sockets for the management interface, it may be possible to cause a denial of service hitting the nofile limit as there is no possibility to configure or set a maximum number of connections.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly: No timeout for EAP management interface may lead to Denial of Service (DoS)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat rates this as a Low impact since this requires high privileges to jeopardize the system. The management interface is normally internal/local only and not exposed externally.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform 8" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-4029" }, { "category": "external", "summary": "RHBZ#2278615", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278615" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-4029", "url": "https://www.cve.org/CVERecord?id=CVE-2024-4029" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-4029", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4029" } ], "release_date": "2024-05-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-04T20:56:02+00:00", "details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "Red Hat JBoss Enterprise Application Platform 8" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8826" }, { "category": "workaround", "details": "Currently there is no available mitigation for this vulnerability. Please make sure to perform updates as they become available.", "product_ids": [ "Red Hat JBoss Enterprise Application Platform 8" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Enterprise Application Platform 8" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "wildfly: No timeout for EAP management interface may lead to Denial of Service (DoS)" }, { "acknowledgments": [ { "names": [ "Tanner Emek" ] } ], "cve": "CVE-2024-8698", "cwe": { "id": "CWE-347", "name": "Improper Verification of Cryptographic Signature" }, "discovery_date": "2024-09-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2311641" } ], "notes": [ { "category": "description", "text": "A flaw exists in the SAML signature validation method within the Keycloak XMLSignatureUtil class. The method incorrectly determines whether a SAML signature is for the full document or only for specific assertions based on the position of the signature in the XML document, rather than the Reference element used to specify the signed element. This flaw allows attackers to create crafted responses that can bypass the validation, potentially leading to privilege escalation or impersonation attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak-saml-core: Improper Verification of SAML Responses Leading to Privilege Escalation in Keycloak", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is of high severity due to its potential to facilitate privilege escalation and user impersonation in systems using SAML for authentication. The core issue stems from improper validation logic in Keycloak\u0027s signature validation method, which relies on the position of signatures rather than explicitly checking the referenced elements. By manipulating the XML structure, an attacker can bypass signature validation and inject an unsigned assertion while retaining a valid signed one. This allows unauthorized access to high-privileged accounts, leading to significant security risks in SAML-based identity providers and service providers.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform 8" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-8698" }, { "category": "external", "summary": "RHBZ#2311641", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2311641" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-8698", "url": "https://www.cve.org/CVERecord?id=CVE-2024-8698" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-8698", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-8698" } ], "release_date": "2024-09-19T15:12:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-04T20:56:02+00:00", "details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "Red Hat JBoss Enterprise Application Platform 8" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8826" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Red Hat JBoss Enterprise Application Platform 8" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:L", "version": "3.1" }, "products": [ "Red Hat JBoss Enterprise Application Platform 8" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "keycloak-saml-core: Improper Verification of SAML Responses Leading to Privilege Escalation in Keycloak" }, { "acknowledgments": [ { "names": [ "Niklas Conrad", "Karsten Meyer zu Selhausen" ] } ], "cve": "CVE-2024-8883", "cwe": { "id": "CWE-601", "name": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)" }, "discovery_date": "2024-09-16T06:17:01.573000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2312511" } ], "notes": [ { "category": "description", "text": "A misconfiguration flaw was found in Keycloak. This issue can allow an attacker to redirect users to an arbitrary URL if a \u0027Valid Redirect URI\u0027 is set to http://localhost or http://127.0.0.1, enabling sensitive information such as authorization codes to be exposed to the attacker, potentially leading to session hijacking.", "title": "Vulnerability description" }, { "category": "summary", "text": "Keycloak: Vulnerable Redirect URI Validation Results in Open Redirec", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform 8" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-8883" }, { "category": "external", "summary": "RHBZ#2312511", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2312511" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-8883", "url": "https://www.cve.org/CVERecord?id=CVE-2024-8883" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-8883", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-8883" }, { "category": "external", "summary": "https://github.com/keycloak/keycloak/blob/main/services/src/main/java/org/keycloak/protocol/oidc/utils/RedirectUtils.java", "url": "https://github.com/keycloak/keycloak/blob/main/services/src/main/java/org/keycloak/protocol/oidc/utils/RedirectUtils.java" } ], "release_date": "2024-09-19T15:13:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-04T20:56:02+00:00", "details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "Red Hat JBoss Enterprise Application Platform 8" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8826" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Red Hat JBoss Enterprise Application Platform 8" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "Red Hat JBoss Enterprise Application Platform 8" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Keycloak: Vulnerable Redirect URI Validation Results in Open Redirec" }, { "cve": "CVE-2024-41172", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "discovery_date": "2024-07-19T09:20:34+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2298829" } ], "notes": [ { "category": "description", "text": "A memory consumption flaw was found in Apache CXF. This issue may allow a CXF HTTP client conduit to prevent HTTPClient instances from being garbage collected, eventually causing the application to run out of memory.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache: cxf: org.apache.cxf:cxf-rt-transports-http: unrestricted memory consumption in CXF HTTP clients", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform 8" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-41172" }, { "category": "external", "summary": "RHBZ#2298829", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2298829" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-41172", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41172" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-41172", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41172" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-4mgg-fqfq-64hg", "url": "https://github.com/advisories/GHSA-4mgg-fqfq-64hg" }, { "category": "external", "summary": "https://lists.apache.org/thread/n2hvbrgwpdtcqdccod8by28ynnolybl6", "url": "https://lists.apache.org/thread/n2hvbrgwpdtcqdccod8by28ynnolybl6" }, { "category": "external", "summary": "https://osv.dev/vulnerability/GHSA-4mgg-fqfq-64hg", "url": "https://osv.dev/vulnerability/GHSA-4mgg-fqfq-64hg" } ], "release_date": "2024-07-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-04T20:56:02+00:00", "details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "Red Hat JBoss Enterprise Application Platform 8" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8826" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "Red Hat JBoss Enterprise Application Platform 8" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "apache: cxf: org.apache.cxf:cxf-rt-transports-http: unrestricted memory consumption in CXF HTTP clients" } ] }
wid-sec-w-2024-0671
Vulnerability from csaf_certbund
Published
2024-03-19 23:00
Modified
2024-03-20 23:00
Summary
Atlassian Jira Software: Mehrere Schwachstellen ermöglichen Codeausführung und DoS
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Jira ist eine Webanwendung zur Softwareentwicklung.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in der Atlassian Jira Software ausnutzen, um beliebigen Code auszuführen oder einen Denial-of-Service-Zustand zu verursachen.
Betroffene Betriebssysteme
- Linux
- MacOS X
- Windows
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Jira ist eine Webanwendung zur Softwareentwicklung.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in der Atlassian Jira Software ausnutzen, um beliebigen Code auszuf\u00fchren oder einen Denial-of-Service-Zustand zu verursachen.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- MacOS X\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0671 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0671.json" }, { "category": "self", "summary": "WID-SEC-2024-0671 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0671" }, { "category": "external", "summary": "Atlassian Security Advisory vom 2024-03-19", "url": "https://confluence.atlassian.com/security/security-bulletin-march-19-2024-1369444862.html" } ], "source_lang": "en-US", "title": "Atlassian Jira Software: Mehrere Schwachstellen erm\u00f6glichen Codeausf\u00fchrung und DoS", "tracking": { "current_release_date": "2024-03-20T23:00:00.000+00:00", "generator": { "date": "2024-03-21T10:35:53.821+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2024-0671", "initial_release_date": "2024-03-19T23:00:00.000+00:00", "revision_history": [ { "date": "2024-03-19T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-03-20T23:00:00.000+00:00", "number": "2", "summary": "CVSS korrigiert" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "Data Center and Server \u003c 9.14.1", "product": { "name": "Atlassian Jira Software Data Center and Server \u003c 9.14.1", "product_id": "T033559", "product_identification_helper": { "cpe": "cpe:/a:atlassian:jira_software:data_center_and_server__9.14.1" } } }, { "category": "product_version_range", "name": "Data Center \u003c 9.14.0", "product": { "name": "Atlassian Jira Software Data Center \u003c 9.14.0", "product_id": "T033561", "product_identification_helper": { "cpe": "cpe:/a:atlassian:jira_software:data_center__9.14.0" } } }, { "category": "product_version_range", "name": "Data Center and Server \u003c 9.13.1", "product": { "name": "Atlassian Jira Software Data Center and Server \u003c 9.13.1", "product_id": "T033563", "product_identification_helper": { "cpe": "cpe:/a:atlassian:jira_software:data_center_and_server__9.13.1" } } }, { "category": "product_version_range", "name": "Data Center and Server \u003c 9.12.5", "product": { "name": "Atlassian Jira Software Data Center and Server \u003c 9.12.5", "product_id": "T033564", "product_identification_helper": { "cpe": "cpe:/a:atlassian:jira_software:data_center_and_server__9.12.5" } } }, { "category": "product_version_range", "name": "Data Center and Server \u003c 9.4.18", "product": { "name": "Atlassian Jira Software Data Center and Server \u003c 9.4.18", "product_id": "T033566", "product_identification_helper": { "cpe": "cpe:/a:atlassian:jira_software:data_center_and_server__9.4.18" } } } ], "category": "product_name", "name": "Jira Software" } ], "category": "vendor", "name": "Atlassian" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-5072", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in der Atlassian Jira Software. Diese Fehler bestehen in den Komponenten Data Center und Server und basieren auf Problemen mehrerer Dritthersteller. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-03-19T23:00:00Z", "title": "CVE-2023-5072" }, { "cve": "CVE-2023-43642", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in der Atlassian Jira Software. Diese Fehler bestehen in den Komponenten Data Center und Server und basieren auf Problemen mehrerer Dritthersteller. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-03-19T23:00:00Z", "title": "CVE-2023-43642" }, { "cve": "CVE-2023-39410", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in der Atlassian Jira Software. Diese Fehler bestehen in den Komponenten Data Center und Server und basieren auf Problemen mehrerer Dritthersteller. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-03-19T23:00:00Z", "title": "CVE-2023-39410" }, { "cve": "CVE-2023-34455", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in der Atlassian Jira Software. Diese Fehler bestehen in den Komponenten Data Center und Server und basieren auf Problemen mehrerer Dritthersteller. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-03-19T23:00:00Z", "title": "CVE-2023-34455" }, { "cve": "CVE-2023-34454", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in der Atlassian Jira Software. Diese Fehler bestehen in den Komponenten Data Center und Server und basieren auf Problemen mehrerer Dritthersteller. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-03-19T23:00:00Z", "title": "CVE-2023-34454" }, { "cve": "CVE-2023-34453", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in der Atlassian Jira Software. Diese Fehler bestehen in den Komponenten Data Center und Server und basieren auf Problemen mehrerer Dritthersteller. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-03-19T23:00:00Z", "title": "CVE-2023-34453" }, { "cve": "CVE-2023-1436", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in der Atlassian Jira Software. Diese Fehler bestehen in den Komponenten Data Center und Server und basieren auf Problemen mehrerer Dritthersteller. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-03-19T23:00:00Z", "title": "CVE-2023-1436" }, { "cve": "CVE-2022-45688", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in der Atlassian Jira Software. Diese Fehler bestehen in den Komponenten Data Center und Server und basieren auf Problemen mehrerer Dritthersteller. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-03-19T23:00:00Z", "title": "CVE-2022-45688" }, { "cve": "CVE-2022-45685", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in der Atlassian Jira Software. Diese Fehler bestehen in den Komponenten Data Center und Server und basieren auf Problemen mehrerer Dritthersteller. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-03-19T23:00:00Z", "title": "CVE-2022-45685" }, { "cve": "CVE-2022-42890", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in der Atlassian Jira Software. Diese Fehler bestehen in den Komponenten Data Center und Server und basieren auf Problemen mehrerer Dritthersteller. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-03-19T23:00:00Z", "title": "CVE-2022-42890" }, { "cve": "CVE-2022-41704", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in der Atlassian Jira Software. Diese Fehler bestehen in den Komponenten Data Center und Server und basieren auf Problemen mehrerer Dritthersteller. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-03-19T23:00:00Z", "title": "CVE-2022-41704" }, { "cve": "CVE-2022-40150", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in der Atlassian Jira Software. Diese Fehler bestehen in den Komponenten Data Center und Server und basieren auf Problemen mehrerer Dritthersteller. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-03-19T23:00:00Z", "title": "CVE-2022-40150" }, { "cve": "CVE-2022-40149", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in der Atlassian Jira Software. Diese Fehler bestehen in den Komponenten Data Center und Server und basieren auf Problemen mehrerer Dritthersteller. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-03-19T23:00:00Z", "title": "CVE-2022-40149" }, { "cve": "CVE-2022-40146", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in der Atlassian Jira Software. Diese Fehler bestehen in den Komponenten Data Center und Server und basieren auf Problemen mehrerer Dritthersteller. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-03-19T23:00:00Z", "title": "CVE-2022-40146" }, { "cve": "CVE-2022-3509", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in der Atlassian Jira Software. Diese Fehler bestehen in den Komponenten Data Center und Server und basieren auf Problemen mehrerer Dritthersteller. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-03-19T23:00:00Z", "title": "CVE-2022-3509" }, { "cve": "CVE-2022-34169", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in der Atlassian Jira Software. Diese Fehler bestehen in den Komponenten Data Center und Server und basieren auf Problemen mehrerer Dritthersteller. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-03-19T23:00:00Z", "title": "CVE-2022-34169" }, { "cve": "CVE-2022-3171", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in der Atlassian Jira Software. Diese Fehler bestehen in den Komponenten Data Center und Server und basieren auf Problemen mehrerer Dritthersteller. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-03-19T23:00:00Z", "title": "CVE-2022-3171" }, { "cve": "CVE-2022-29546", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in der Atlassian Jira Software. Diese Fehler bestehen in den Komponenten Data Center und Server und basieren auf Problemen mehrerer Dritthersteller. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-03-19T23:00:00Z", "title": "CVE-2022-29546" }, { "cve": "CVE-2022-28366", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in der Atlassian Jira Software. Diese Fehler bestehen in den Komponenten Data Center und Server und basieren auf Problemen mehrerer Dritthersteller. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-03-19T23:00:00Z", "title": "CVE-2022-28366" }, { "cve": "CVE-2022-24839", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in der Atlassian Jira Software. Diese Fehler bestehen in den Komponenten Data Center und Server und basieren auf Problemen mehrerer Dritthersteller. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-03-19T23:00:00Z", "title": "CVE-2022-24839" } ] }
wid-sec-w-2023-0122
Vulnerability from csaf_certbund
Published
2023-01-17 23:00
Modified
2023-01-17 23:00
Summary
Oracle Supply Chain: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Die Oracle Supply Chain ist eine Sammlung von Applikationen für verschiedene Zwecke.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Oracle Supply Chain ausnutzen, um die Vertraulichkeit, Integrität und Verfügbarkeit zu gefährden.
Betroffene Betriebssysteme
- UNIX
- Linux
- Windows
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Die Oracle Supply Chain ist eine Sammlung von Applikationen f\u00fcr verschiedene Zwecke.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Oracle Supply Chain ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-0122 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-0122.json" }, { "category": "self", "summary": "WID-SEC-2023-0122 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0122" }, { "category": "external", "summary": "Oracle Critical Patch Update Advisory - January 2023 - Appendix Oracle Supply Chain vom 2023-01-17", "url": "https://www.oracle.com/security-alerts/cpujan2023.html#AppendixSCP" } ], "source_lang": "en-US", "title": "Oracle Supply Chain: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-01-17T23:00:00.000+00:00", "generator": { "date": "2024-02-15T17:10:15.790+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-0122", "initial_release_date": "2023-01-17T23:00:00.000+00:00", "revision_history": [ { "date": "2023-01-17T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Oracle Supply Chain 9.3.6", "product": { "name": "Oracle Supply Chain 9.3.6", "product_id": "T019052", "product_identification_helper": { "cpe": "cpe:/a:oracle:supply_chain:9.3.6" } } }, { "category": "product_name", "name": "Oracle Supply Chain 12.1", "product": { "name": "Oracle Supply Chain 12.1", "product_id": "T019054", "product_identification_helper": { "cpe": "cpe:/a:oracle:supply_chain:12.1" } } }, { "category": "product_name", "name": "Oracle Supply Chain 12.2", "product": { "name": "Oracle Supply Chain 12.2", "product_id": "T019055", "product_identification_helper": { "cpe": "cpe:/a:oracle:supply_chain:12.2" } } }, { "category": "product_name", "name": "Oracle Supply Chain 12.2.11", "product": { "name": "Oracle Supply Chain 12.2.11", "product_id": "T021721", "product_identification_helper": { "cpe": "cpe:/a:oracle:supply_chain:12.2.11" } } }, { "category": "product_name", "name": "Oracle Supply Chain \u003c 21.0.2.6", "product": { "name": "Oracle Supply Chain \u003c 21.0.2.6", "product_id": "T025892", "product_identification_helper": { "cpe": "cpe:/a:oracle:supply_chain:21.0.2.6" } } }, { "category": "product_name", "name": "Oracle Supply Chain 12.2.7", "product": { "name": "Oracle Supply Chain 12.2.7", "product_id": "T025893", "product_identification_helper": { "cpe": "cpe:/a:oracle:supply_chain:12.2.7" } } }, { "category": "product_name", "name": "Oracle Supply Chain 12.2.8", "product": { "name": "Oracle Supply Chain 12.2.8", "product_id": "T025894", "product_identification_helper": { "cpe": "cpe:/a:oracle:supply_chain:12.2.8" } } }, { "category": "product_name", "name": "Oracle Supply Chain 12.2.9", "product": { "name": "Oracle Supply Chain 12.2.9", "product_id": "T025895", "product_identification_helper": { "cpe": "cpe:/a:oracle:supply_chain:12.2.9" } } }, { "category": "product_name", "name": "Oracle Supply Chain 12.2.10", "product": { "name": "Oracle Supply Chain 12.2.10", "product_id": "T025896", "product_identification_helper": { "cpe": "cpe:/a:oracle:supply_chain:12.2.10" } } }, { "category": "product_name", "name": "Oracle Supply Chain 12.2.12", "product": { "name": "Oracle Supply Chain 12.2.12", "product_id": "T025897", "product_identification_helper": { "cpe": "cpe:/a:oracle:supply_chain:12.2.12" } } }, { "category": "product_name", "name": "Oracle Supply Chain \u003c 21.0.2.0", "product": { "name": "Oracle Supply Chain \u003c 21.0.2.0", "product_id": "T025898", "product_identification_helper": { "cpe": "cpe:/a:oracle:supply_chain:21.0.2.0" } } } ], "category": "product_name", "name": "Supply Chain" } ], "category": "vendor", "name": "Oracle" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-21850", "notes": [ { "category": "description", "text": "In Oracle Supply Chain existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T021721", "T019052", "T025895", "T025894", "T019054", "T025897", "T025896", "T019055", "T025893" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2023-21850" }, { "cve": "CVE-2022-42252", "notes": [ { "category": "description", "text": "In Oracle Supply Chain existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T021721", "T019052", "T025895", "T025894", "T019054", "T025897", "T025896", "T019055", "T025893" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-42252" }, { "cve": "CVE-2022-34169", "notes": [ { "category": "description", "text": "In Oracle Supply Chain existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T021721", "T019052", "T025895", "T025894", "T019054", "T025897", "T025896", "T019055", "T025893" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-34169" }, { "cve": "CVE-2022-24839", "notes": [ { "category": "description", "text": "In Oracle Supply Chain existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T021721", "T019052", "T025895", "T025894", "T019054", "T025897", "T025896", "T019055", "T025893" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-24839" }, { "cve": "CVE-2021-44832", "notes": [ { "category": "description", "text": "In Oracle Supply Chain existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T021721", "T019052", "T025895", "T025894", "T019054", "T025897", "T025896", "T019055", "T025893" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2021-44832" }, { "cve": "CVE-2020-27844", "notes": [ { "category": "description", "text": "In Oracle Supply Chain existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T021721", "T019052", "T025895", "T025894", "T019054", "T025897", "T025896", "T019055", "T025893" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2020-27844" }, { "cve": "CVE-2019-7317", "notes": [ { "category": "description", "text": "In Oracle Supply Chain existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T021721", "T019052", "T025895", "T025894", "T019054", "T025897", "T025896", "T019055", "T025893" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2019-7317" }, { "cve": "CVE-2019-12415", "notes": [ { "category": "description", "text": "In Oracle Supply Chain existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T021721", "T019052", "T025895", "T025894", "T019054", "T025897", "T025896", "T019055", "T025893" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2019-12415" } ] }
WID-SEC-W-2022-0759
Vulnerability from csaf_certbund
Published
2022-07-19 22:00
Modified
2024-06-10 22:00
Summary
Oracle Java SE: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Die Java Platform, Standard Edition (SE) ist eine Sammlung von Java-APIs (JDK) und der Java Laufzeit Umgebung (JRE).
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Oracle Java SE ausnutzen, um die Vertraulichkeit, Integrität und Verfügbarkeit zu gefährden.
Betroffene Betriebssysteme
- Linux
- MacOS X
- Sonstiges
- UNIX
- Windows
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Die Java Platform, Standard Edition (SE) ist eine Sammlung von Java-APIs (JDK) und der Java Laufzeit Umgebung (JRE).", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Oracle Java SE ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- MacOS X\n- Sonstiges\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-0759 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0759.json" }, { "category": "self", "summary": "WID-SEC-2022-0759 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0759" }, { "category": "external", "summary": "Menu - Appendix Oracle Java SE vom 2022-07-19", "url": "https://www.oracle.com/security-alerts/cpujul2022.html#AppendixJAVA" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-1824 vom 2022-07-21", "url": "https://alas.aws.amazon.com/AL2/ALAS-2022-1824.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-1823 vom 2022-07-21", "url": "https://alas.aws.amazon.com/AL2/ALAS-2022-1823.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-5683 vom 2022-07-22", "url": "http://linux.oracle.com/errata/ELSA-2022-5683.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-111 vom 2022-07-21", "url": "https://alas.aws.amazon.com/AL2022/ALAS-2022-111.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-112 vom 2022-07-21", "url": "https://alas.aws.amazon.com/AL2022/ALAS-2022-112.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-113 vom 2022-07-21", "url": "https://alas.aws.amazon.com/AL2022/ALAS-2022-113.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-5687 vom 2022-07-22", "url": "http://linux.oracle.com/errata/ELSA-2022-5687.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-1822 vom 2022-07-21", "url": "https://alas.aws.amazon.com/AL2/ALAS-2022-1822.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2CORRETTO8-2022-003 vom 2022-07-21", "url": "https://alas.aws.amazon.com/AL2/ALASCORRETTO8-2022-003.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-5696 vom 2022-07-26", "url": "https://linux.oracle.com/errata/ELSA-2022-5696.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-5698 vom 2022-07-25", "url": "https://linux.oracle.com/errata/ELSA-2022-5698.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2660-1 vom 2022-08-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011767.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-120 vom 2022-08-05", "url": "https://alas.aws.amazon.com/AL2022/ALAS-2022-120.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-119 vom 2022-08-05", "url": "https://alas.aws.amazon.com/AL2022/ALAS-2022-119.html" }, { "category": "external", "summary": "Hitachi Vulnerability Information HITACHI-SEC-2022-127 vom 2022-08-09", "url": "https://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/hitachi-sec-2022-127/index.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2898-1 vom 2022-08-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011996.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2899-1 vom 2022-08-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011995.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2949-1 vom 2022-08-31", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-August/012014.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:3092-1 vom 2022-09-06", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-September/012103.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-5227 vom 2022-09-07", "url": "https://lists.debian.org/debian-security-announce/2022/msg00196.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-1633 vom 2022-09-12", "url": "https://alas.aws.amazon.com/ALAS-2022-1633.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-1835 vom 2022-09-15", "url": "https://alas.aws.amazon.com/AL2/ALAS-2022-1835.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:4166-1 vom 2022-11-22", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-November/013066.html" }, { "category": "external", "summary": "Juniper Security Advisory JSA70185 vom 2023-01-12", "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-22-3R1-release?language=en_US" }, { "category": "external", "summary": "IBM Security Bulletin 6856221 vom 2023-01-18", "url": "https://www.ibm.com/support/pages/node/6856221" }, { "category": "external", "summary": "IBM Security Bulletin 7014699 vom 2023-07-26", "url": "https://www.ibm.com/support/pages/node/7014699" }, { "category": "external", "summary": "IBM Security Bulletin 7140420 vom 2024-03-13", "url": "https://www.ibm.com/support/pages/node/7140420" }, { "category": "external", "summary": "Gentoo Linux Security Advisory GLSA-202405-16 vom 2024-05-05", "url": "https://security.gentoo.org/glsa/202405-16" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:3780 vom 2024-06-10", "url": "https://access.redhat.com/errata/RHSA-2024:3780" } ], "source_lang": "en-US", "title": "Oracle Java SE: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-06-10T22:00:00.000+00:00", "generator": { "date": "2024-06-11T08:07:52.212+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-0759", "initial_release_date": "2022-07-19T22:00:00.000+00:00", "revision_history": [ { "date": "2022-07-19T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-07-20T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2022-07-21T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Oracle Linux und Amazon aufgenommen" }, { "date": "2022-07-25T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2022-08-03T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-08-04T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2022-08-08T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von HITACHI aufgenommen" }, { "date": "2022-08-25T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-08-31T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-09-06T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-09-07T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2022-09-12T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2022-09-14T22:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2022-11-22T23:00:00.000+00:00", "number": "14", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-01-11T23:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Juniper aufgenommen" }, { "date": "2023-01-18T23:00:00.000+00:00", "number": "16", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2023-07-26T22:00:00.000+00:00", "number": "17", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-03-12T23:00:00.000+00:00", "number": "18", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-05-05T22:00:00.000+00:00", "number": "19", "summary": "Neue Updates von Gentoo aufgenommen" }, { "date": "2024-06-10T22:00:00.000+00:00", "number": "20", "summary": "Neue Updates von Red Hat aufgenommen" } ], "status": "final", "version": "20" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Gentoo Linux", "product": { "name": "Gentoo Linux", "product_id": "T012167", "product_identification_helper": { "cpe": "cpe:/o:gentoo:linux:-" } } } ], "category": "vendor", "name": "Gentoo" }, { "branches": [ { "category": "product_name", "name": "Hitachi Command Suite", "product": { "name": "Hitachi Command Suite", "product_id": "T010951", "product_identification_helper": { "cpe": "cpe:/a:hitachi:command_suite:-" } } }, { "category": "product_name", "name": "Hitachi Configuration Manager", "product": { "name": "Hitachi Configuration Manager", "product_id": "T020304", "product_identification_helper": { "cpe": "cpe:/a:hitachi:configuration_manager:-" } } }, { "category": "product_name", "name": "Hitachi Ops Center", "product": { "name": "Hitachi Ops Center", "product_id": "T017562", "product_identification_helper": { "cpe": "cpe:/a:hitachi:ops_center:-" } } } ], "category": "vendor", "name": "Hitachi" }, { "branches": [ { "category": "product_name", "name": "IBM InfoSphere Guardium", "product": { "name": "IBM InfoSphere Guardium", "product_id": "T002366", "product_identification_helper": { "cpe": "cpe:/a:ibm:infosphere_guardium:-" } } }, { "branches": [ { "category": "product_version", "name": "7.5", "product": { "name": "IBM QRadar SIEM 7.5", "product_id": "T022954", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:7.5" } } } ], "category": "product_name", "name": "QRadar SIEM" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "category": "product_name", "name": "Juniper Junos Space", "product": { "name": "Juniper Junos Space", "product_id": "T003343", "product_identification_helper": { "cpe": "cpe:/a:juniper:junos_space:-" } } } ], "category": "vendor", "name": "Juniper" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "11.0.15.1", "product": { "name": "Oracle Java SE 11.0.15.1", "product_id": "T023943", "product_identification_helper": { "cpe": "cpe:/a:oracle:java_se:11.0.15.1" } } }, { "category": "product_version", "name": "17.0.3.1", "product": { "name": "Oracle Java SE 17.0.3.1", "product_id": "T023944", "product_identification_helper": { "cpe": "cpe:/a:oracle:java_se:17.0.3.1" } } }, { "category": "product_version", "name": "21.3.2", "product": { "name": "Oracle Java SE 21.3.2", "product_id": "T023945", "product_identification_helper": { "cpe": "cpe:/a:oracle:java_se:21.3.2" } } }, { "category": "product_version", "name": "22.1.0", "product": { "name": "Oracle Java SE 22.1.0", "product_id": "T023946", "product_identification_helper": { "cpe": "cpe:/a:oracle:java_se:22.1.0" } } }, { "category": "product_version", "name": "7u343", "product": { "name": "Oracle Java SE 7u343", "product_id": "T023985", "product_identification_helper": { "cpe": "cpe:/a:oracle:java_se:7u343" } } }, { "category": "product_version", "name": "8u333", "product": { "name": "Oracle Java SE 8u333", "product_id": "T023986", "product_identification_helper": { "cpe": "cpe:/a:oracle:java_se:8u333" } } }, { "category": "product_version", "name": "18.0.1.1", "product": { "name": "Oracle Java SE 18.0.1.1", "product_id": "T023987", "product_identification_helper": { "cpe": "cpe:/a:oracle:java_se:18.0.1.1" } } }, { "category": "product_version", "name": "Oracle GraalVM Enterprise Edition: 21.3.2", "product": { "name": "Oracle Java SE Oracle GraalVM Enterprise Edition: 21.3.2", "product_id": "T023989", "product_identification_helper": { "cpe": "cpe:/a:oracle:java_se:oracle_graalvm_enterprise_edition_21.3.2" } } }, { "category": "product_version", "name": "Oracle GraalVM Enterprise Edition: 20.3.6", "product": { "name": "Oracle Java SE Oracle GraalVM Enterprise Edition: 20.3.6", "product_id": "T023990", "product_identification_helper": { "cpe": "cpe:/a:oracle:java_se:oracle_graalvm_enterprise_edition_20.3.6" } } } ], "category": "product_name", "name": "Java SE" }, { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21540", "notes": [ { "category": "description", "text": "In Oracle Java SE existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"LOW\" f\u00fcr \"Confidentiality\", sowie \"HIGH\" f\u00fcr \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "67646", "T010951", "T012167", "T004914", "T017562", "T022954", "T023944", "T023945", "T023989", "T023946", "2951", "T002207", "T023985", "T020304", "T023986", "T023943", "T023987", "T002366", "398363", "T023990" ] }, "release_date": "2022-07-19T22:00:00Z", "title": "CVE-2022-21540" }, { "cve": "CVE-2022-21541", "notes": [ { "category": "description", "text": "In Oracle Java SE existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"LOW\" f\u00fcr \"Confidentiality\", sowie \"HIGH\" f\u00fcr \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "67646", "T010951", "T012167", "T004914", "T017562", "T022954", "T023944", "T023945", "T023989", "T023946", "2951", "T002207", "T023985", "T020304", "T023986", "T023943", "T023987", "T002366", "398363", "T023990" ] }, "release_date": "2022-07-19T22:00:00Z", "title": "CVE-2022-21541" }, { "cve": "CVE-2022-21549", "notes": [ { "category": "description", "text": "In Oracle Java SE existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"LOW\" f\u00fcr \"Confidentiality\", sowie \"HIGH\" f\u00fcr \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "67646", "T010951", "T012167", "T004914", "T017562", "T022954", "T023944", "T023945", "T023989", "T023946", "2951", "T002207", "T023985", "T020304", "T023986", "T023943", "T023987", "T002366", "398363", "T023990" ] }, "release_date": "2022-07-19T22:00:00Z", "title": "CVE-2022-21549" }, { "cve": "CVE-2022-25647", "notes": [ { "category": "description", "text": "In Oracle Java SE existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"LOW\" f\u00fcr \"Confidentiality\", sowie \"HIGH\" f\u00fcr \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "67646", "T010951", "T012167", "T004914", "T017562", "T022954", "T023944", "T023945", "T023989", "T023946", "2951", "T002207", "T023985", "T020304", "T023986", "T023943", "T023987", "T002366", "398363", "T023990" ] }, "release_date": "2022-07-19T22:00:00Z", "title": "CVE-2022-25647" }, { "cve": "CVE-2022-34169", "notes": [ { "category": "description", "text": "In Oracle Java SE existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"LOW\" f\u00fcr \"Confidentiality\", sowie \"HIGH\" f\u00fcr \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "67646", "T010951", "T012167", "T004914", "T017562", "T022954", "T023944", "T023945", "T023989", "T023946", "2951", "T002207", "T023985", "T020304", "T023986", "T023943", "T023987", "T002366", "398363", "T023990" ] }, "release_date": "2022-07-19T22:00:00Z", "title": "CVE-2022-34169" } ] }
WID-SEC-W-2024-0870
Vulnerability from csaf_certbund
Published
2024-04-16 22:00
Modified
2024-04-22 22:00
Summary
Oracle Communications Applications: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Communications Applications umfasst eine Sammlung von Werkzeugen zur Verwaltung von Messaging-, Kommunikationsdiensten und -ressourcen.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Oracle Communications Applications ausnutzen, um die Vertraulichkeit, Integrität und Verfügbarkeit zu gefährden.
Betroffene Betriebssysteme
- Windows
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Communications Applications umfasst eine Sammlung von Werkzeugen zur Verwaltung von Messaging-, Kommunikationsdiensten und -ressourcen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Oracle Communications Applications ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0870 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0870.json" }, { "category": "self", "summary": "WID-SEC-2024-0870 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0870" }, { "category": "external", "summary": "Oracle Critical Patch Update Advisory - April 2024 - Appendix Oracle Communications Applications vom 2024-04-16", "url": "https://www.oracle.com/security-alerts/cpuapr2024.html#AppendixCAGBU" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:1797 vom 2024-04-22", "url": "https://access.redhat.com/errata/RHSA-2024:1797" } ], "source_lang": "en-US", "title": "Oracle Communications Applications: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-04-22T22:00:00.000+00:00", "generator": { "date": "2024-04-23T08:03:05.500+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2024-0870", "initial_release_date": "2024-04-16T22:00:00.000+00:00", "revision_history": [ { "date": "2024-04-16T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-04-22T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Red Hat aufgenommen" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "7.4.1", "product": { "name": "Oracle Communications Applications 7.4.1", "product_id": "T018939", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications_applications:7.4.1" } } }, { "category": "product_version", "name": "7.4.2", "product": { "name": "Oracle Communications Applications 7.4.2", "product_id": "T018940", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications_applications:7.4.2" } } }, { "category": "product_version_range", "name": "\u003c=12.0.0.8", "product": { "name": "Oracle Communications Applications \u003c=12.0.0.8", "product_id": "T034251", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications_applications:12.0.0.8" } } }, { "category": "product_version", "name": "15.0.0.0", "product": { "name": "Oracle Communications Applications 15.0.0.0", "product_id": "T034252", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications_applications:15.0.0.0" } } }, { "category": "product_version", "name": "7.3.6.4", "product": { "name": "Oracle Communications Applications 7.3.6.4", "product_id": "T034253", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications_applications:7.3.6.4" } } }, { "category": "product_version_range", "name": "\u003c=7.4.2", "product": { "name": "Oracle Communications Applications \u003c=7.4.2", "product_id": "T034254", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications_applications:7.4.2" } } }, { "category": "product_version", "name": "7.5.0", "product": { "name": "Oracle Communications Applications 7.5.0", "product_id": "T034255", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications_applications:7.5.0" } } }, { "category": "product_version", "name": "7.5.1", "product": { "name": "Oracle Communications Applications 7.5.1", "product_id": "T034256", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications_applications:7.5.1" } } }, { "category": "product_version", "name": "8.0.0.1.0", "product": { "name": "Oracle Communications Applications 8.0.0.1.0", "product_id": "T034257", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications_applications:8.0.0.1.0" } } } ], "category": "product_name", "name": "Communications Applications" } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-37533", "notes": [ { "category": "description", "text": "In Oracle Communications Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T018940", "67646", "T034253", "T034252", "T018939", "T034257", "T034256", "T034255" ], "last_affected": [ "T034251", "T034254" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2021-37533" }, { "cve": "CVE-2022-34169", "notes": [ { "category": "description", "text": "In Oracle Communications Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T018940", "67646", "T034253", "T034252", "T018939", "T034257", "T034256", "T034255" ], "last_affected": [ "T034251", "T034254" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2022-34169" }, { "cve": "CVE-2022-34381", "notes": [ { "category": "description", "text": "In Oracle Communications Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T018940", "67646", "T034253", "T034252", "T018939", "T034257", "T034256", "T034255" ], "last_affected": [ "T034251", "T034254" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2022-34381" }, { "cve": "CVE-2023-0833", "notes": [ { "category": "description", "text": "In Oracle Communications Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T018940", "67646", "T034253", "T034252", "T018939", "T034257", "T034256", "T034255" ], "last_affected": [ "T034251", "T034254" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2023-0833" }, { "cve": "CVE-2023-2976", "notes": [ { "category": "description", "text": "In Oracle Communications Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T018940", "67646", "T034253", "T034252", "T018939", "T034257", "T034256", "T034255" ], "last_affected": [ "T034251", "T034254" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2023-2976" }, { "cve": "CVE-2023-34053", "notes": [ { "category": "description", "text": "In Oracle Communications Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T018940", "67646", "T034253", "T034252", "T018939", "T034257", "T034256", "T034255" ], "last_affected": [ "T034251", "T034254" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2023-34053" }, { "cve": "CVE-2023-34055", "notes": [ { "category": "description", "text": "In Oracle Communications Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T018940", "67646", "T034253", "T034252", "T018939", "T034257", "T034256", "T034255" ], "last_affected": [ "T034251", "T034254" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2023-34055" }, { "cve": "CVE-2023-4043", "notes": [ { "category": "description", "text": "In Oracle Communications Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T018940", "67646", "T034253", "T034252", "T018939", "T034257", "T034256", "T034255" ], "last_affected": [ "T034251", "T034254" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2023-4043" }, { "cve": "CVE-2023-44487", "notes": [ { "category": "description", "text": "In Oracle Communications Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T018940", "67646", "T034253", "T034252", "T018939", "T034257", "T034256", "T034255" ], "last_affected": [ "T034251", "T034254" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2023-44487" }, { "cve": "CVE-2023-47100", "notes": [ { "category": "description", "text": "In Oracle Communications Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T018940", "67646", "T034253", "T034252", "T018939", "T034257", "T034256", "T034255" ], "last_affected": [ "T034251", "T034254" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2023-47100" }, { "cve": "CVE-2023-6378", "notes": [ { "category": "description", "text": "In Oracle Communications Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T018940", "67646", "T034253", "T034252", "T018939", "T034257", "T034256", "T034255" ], "last_affected": [ "T034251", "T034254" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2023-6378" }, { "cve": "CVE-2024-21634", "notes": [ { "category": "description", "text": "In Oracle Communications Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T018940", "67646", "T034253", "T034252", "T018939", "T034257", "T034256", "T034255" ], "last_affected": [ "T034251", "T034254" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2024-21634" }, { "cve": "CVE-2024-26308", "notes": [ { "category": "description", "text": "In Oracle Communications Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T018940", "67646", "T034253", "T034252", "T018939", "T034257", "T034256", "T034255" ], "last_affected": [ "T034251", "T034254" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2024-26308" } ] }
WID-SEC-W-2024-0899
Vulnerability from csaf_certbund
Published
2024-04-16 22:00
Modified
2024-04-16 22:00
Summary
Oracle Fusion Middleware: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Oracle Fusion Middleware bündelt mehrere Produkte zur Erstellung, Betrieb und Management von intelligenten Business Anwendungen.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Oracle Fusion Middleware ausnutzen, um die Vertraulichkeit, Integrität und Verfügbarkeit zu gefährden.
Betroffene Betriebssysteme
- Linux
- UNIX
- Windows
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Oracle Fusion Middleware b\u00fcndelt mehrere Produkte zur Erstellung, Betrieb und Management von intelligenten Business Anwendungen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Oracle Fusion Middleware ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0899 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0899.json" }, { "category": "self", "summary": "WID-SEC-2024-0899 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0899" }, { "category": "external", "summary": "Oracle Critical Patch Update Advisory - April 2024 - Appendix Oracle Fusion Middleware vom 2024-04-16", "url": "https://www.oracle.com/security-alerts/cpuapr2024.html#AppendixFMW" } ], "source_lang": "en-US", "title": "Oracle Fusion Middleware: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-04-16T22:00:00.000+00:00", "generator": { "date": "2024-04-17T10:37:23.833+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2024-0899", "initial_release_date": "2024-04-16T22:00:00.000+00:00", "revision_history": [ { "date": "2024-04-16T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "12.2.1.3.0", "product": { "name": "Oracle Fusion Middleware 12.2.1.3.0", "product_id": "618028", "product_identification_helper": { "cpe": "cpe:/a:oracle:fusion_middleware:12.2.1.3.0" } } }, { "category": "product_version", "name": "12.2.1.4.0", "product": { "name": "Oracle Fusion Middleware 12.2.1.4.0", "product_id": "751674", "product_identification_helper": { "cpe": "cpe:/a:oracle:fusion_middleware:12.2.1.4.0" } } }, { "category": "product_version", "name": "14.1.1.0.0", "product": { "name": "Oracle Fusion Middleware 14.1.1.0.0", "product_id": "829576", "product_identification_helper": { "cpe": "cpe:/a:oracle:fusion_middleware:14.1.1.0.0" } } }, { "category": "product_version", "name": "8.5.6", "product": { "name": "Oracle Fusion Middleware 8.5.6", "product_id": "T024993", "product_identification_helper": { "cpe": "cpe:/a:oracle:fusion_middleware:8.5.6" } } }, { "category": "product_version", "name": "8.5.7", "product": { "name": "Oracle Fusion Middleware 8.5.7", "product_id": "T034057", "product_identification_helper": { "cpe": "cpe:/a:oracle:fusion_middleware:8.5.7" } } } ], "category": "product_name", "name": "Fusion Middleware" } ], "category": "vendor", "name": "Oracle" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-0231", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2019-0231" }, { "cve": "CVE-2019-10172", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2019-10172" }, { "cve": "CVE-2019-13990", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2019-13990" }, { "cve": "CVE-2021-23369", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2021-23369" }, { "cve": "CVE-2022-1471", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2022-1471" }, { "cve": "CVE-2022-24329", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2022-24329" }, { "cve": "CVE-2022-25147", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2022-25147" }, { "cve": "CVE-2022-34169", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2022-34169" }, { "cve": "CVE-2022-34381", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2022-34381" }, { "cve": "CVE-2022-42003", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2022-42003" }, { "cve": "CVE-2022-45378", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2022-45378" }, { "cve": "CVE-2022-46337", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2022-46337" }, { "cve": "CVE-2022-48579", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2022-48579" }, { "cve": "CVE-2023-24021", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2023-24021" }, { "cve": "CVE-2023-2976", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2023-2976" }, { "cve": "CVE-2023-31122", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2023-31122" }, { "cve": "CVE-2023-33201", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2023-33201" }, { "cve": "CVE-2023-35116", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2023-35116" }, { "cve": "CVE-2023-35887", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2023-35887" }, { "cve": "CVE-2023-3635", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2023-3635" }, { "cve": "CVE-2023-37536", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2023-37536" }, { "cve": "CVE-2023-44487", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2023-44487" }, { "cve": "CVE-2023-46218", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2023-46218" }, { "cve": "CVE-2023-46589", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2023-46589" }, { "cve": "CVE-2023-48795", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2023-48795" }, { "cve": "CVE-2023-5072", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2023-5072" }, { "cve": "CVE-2023-52428", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2023-52428" }, { "cve": "CVE-2024-1597", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2024-1597" }, { "cve": "CVE-2024-20991", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2024-20991" }, { "cve": "CVE-2024-20992", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2024-20992" }, { "cve": "CVE-2024-21006", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2024-21006" }, { "cve": "CVE-2024-21007", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2024-21007" }, { "cve": "CVE-2024-21117", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2024-21117" }, { "cve": "CVE-2024-21118", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2024-21118" }, { "cve": "CVE-2024-21119", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2024-21119" }, { "cve": "CVE-2024-21120", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2024-21120" }, { "cve": "CVE-2024-23635", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2024-23635" }, { "cve": "CVE-2024-26308", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2024-26308" } ] }
wid-sec-w-2024-0124
Vulnerability from csaf_certbund
Published
2024-01-16 23:00
Modified
2024-01-16 23:00
Summary
Oracle Financial Services Applications: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Oracle Financial Services ist eine Zusammenstellung von Anwendungen für den Finanzsektor und eine Technologiebasis zur Erfüllung von IT- und Geschäftsanforderungen.
Angriff
Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Oracle Financial Services Applications ausnutzen, um die Vertraulichkeit, Integrität und Verfügbarkeit zu gefährden.
Betroffene Betriebssysteme
- UNIX
- Linux
- Windows
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Oracle Financial Services ist eine Zusammenstellung von Anwendungen f\u00fcr den Finanzsektor und eine Technologiebasis zur Erf\u00fcllung von IT- und Gesch\u00e4ftsanforderungen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Oracle Financial Services Applications ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0124 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0124.json" }, { "category": "self", "summary": "WID-SEC-2024-0124 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0124" }, { "category": "external", "summary": "Oracle Critical Patch Update Advisory - January 2024 - Appendix Oracle Financial Services Applications vom 2024-01-16", "url": "https://www.oracle.com/security-alerts/cpujan2024.html#AppendixIFLX" } ], "source_lang": "en-US", "title": "Oracle Financial Services Applications: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-01-16T23:00:00.000+00:00", "generator": { "date": "2024-02-15T17:56:56.463+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2024-0124", "initial_release_date": "2024-01-16T23:00:00.000+00:00", "revision_history": [ { "date": "2024-01-16T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Oracle Financial Services Applications 2.7.1", "product": { "name": "Oracle Financial Services Applications 2.7.1", "product_id": "T018979", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:2.7.1" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 2.8.0", "product": { "name": "Oracle Financial Services Applications 2.8.0", "product_id": "T018980", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:2.8.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 2.9.0", "product": { "name": "Oracle Financial Services Applications 2.9.0", "product_id": "T018981", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:2.9.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.1.0", "product": { "name": "Oracle Financial Services Applications 8.1.0", "product_id": "T018983", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.0.9", "product": { "name": "Oracle Financial Services Applications 8.0.9", "product_id": "T019890", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.0.9" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.1.1", "product": { "name": "Oracle Financial Services Applications 8.1.1", "product_id": "T019891", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.1" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.0.7", "product": { "name": "Oracle Financial Services Applications 8.0.7", "product_id": "T021676", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.0.7" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.0.8", "product": { "name": "Oracle Financial Services Applications 8.0.8", "product_id": "T021677", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.0.8" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.1.1.1", "product": { "name": "Oracle Financial Services Applications 8.1.1.1", "product_id": "T022835", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.1.1" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.0.8.1", "product": { "name": "Oracle Financial Services Applications 8.0.8.1", "product_id": "T022844", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.0.8.1" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.0.8.2", "product": { "name": "Oracle Financial Services Applications 8.0.8.2", "product_id": "T024990", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.0.8.2" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 2.9.1", "product": { "name": "Oracle Financial Services Applications 2.9.1", "product_id": "T027359", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:2.9.1" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.1.2", "product": { "name": "Oracle Financial Services Applications 8.1.2", "product_id": "T028705", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.2" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.1.2.5", "product": { "name": "Oracle Financial Services Applications 8.1.2.5", "product_id": "T028706", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.2.5" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications \u003c= 14.7.0", "product": { "name": "Oracle Financial Services Applications \u003c= 14.7.0", "product_id": "T028707", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:14.7.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 22.1.0", "product": { "name": "Oracle Financial Services Applications 22.1.0", "product_id": "T032101", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:22.1.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 22.2.0", "product": { "name": "Oracle Financial Services Applications 22.2.0", "product_id": "T032102", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:22.2.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 21.1.0", "product": { "name": "Oracle Financial Services Applications 21.1.0", "product_id": "T032103", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:21.1.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.1.2.6", "product": { "name": "Oracle Financial Services Applications 8.1.2.6", "product_id": "T032104", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.2.6" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 19.1.0", "product": { "name": "Oracle Financial Services Applications 19.1.0", "product_id": "T032105", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:19.1.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 5.0.0", "product": { "name": "Oracle Financial Services Applications 5.0.0", "product_id": "T032106", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:5.0.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 5.1.0", "product": { "name": "Oracle Financial Services Applications 5.1.0", "product_id": "T032107", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:5.1.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications \u003c= 3.2.0", "product": { "name": "Oracle Financial Services Applications \u003c= 3.2.0", "product_id": "T032108", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:3.2.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 4.0.0", "product": { "name": "Oracle Financial Services Applications 4.0.0", "product_id": "T032109", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:4.0.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 6.0.0", "product": { "name": "Oracle Financial Services Applications 6.0.0", "product_id": "T032110", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:6.0.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 14.7.0.3.0", "product": { "name": "Oracle Financial Services Applications 14.7.0.3.0", "product_id": "T032111", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:14.7.0.3.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 3.0.0", "product": { "name": "Oracle Financial Services Applications 3.0.0", "product_id": "T032112", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:3.0.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 3.1.0", "product": { "name": "Oracle Financial Services Applications 3.1.0", "product_id": "T032113", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:3.1.0" } } } ], "category": "product_name", "name": "Financial Services Applications" } ], "category": "vendor", "name": "Oracle" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-5072", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T032104", "T032105", "T032102", "T032103", "T032109", "T032106", "T032107", "T019890", "T019891", "T032101", "T018980", "T018981", "T021677", "T022844", "T018983", "T021676", "T028705", "T028706", "T027359", "T032113", "T032111", "T032112", "T032110", "T022835", "T018979", "T024990" ], "last_affected": [ "T028707", "T032108" ] }, "release_date": "2024-01-16T23:00:00Z", "title": "CVE-2023-5072" }, { "cve": "CVE-2023-46604", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T032104", "T032105", "T032102", "T032103", "T032109", "T032106", "T032107", "T019890", "T019891", "T032101", "T018980", "T018981", "T021677", "T022844", "T018983", "T021676", "T028705", "T028706", "T027359", "T032113", "T032111", "T032112", "T032110", "T022835", "T018979", "T024990" ], "last_affected": [ "T028707", "T032108" ] }, "release_date": "2024-01-16T23:00:00Z", "title": "CVE-2023-46604" }, { "cve": "CVE-2023-44483", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T032104", "T032105", "T032102", "T032103", "T032109", "T032106", "T032107", "T019890", "T019891", "T032101", "T018980", "T018981", "T021677", "T022844", "T018983", "T021676", "T028705", "T028706", "T027359", "T032113", "T032111", "T032112", "T032110", "T022835", "T018979", "T024990" ], "last_affected": [ "T028707", "T032108" ] }, "release_date": "2024-01-16T23:00:00Z", "title": "CVE-2023-44483" }, { "cve": "CVE-2023-42503", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T032104", "T032105", "T032102", "T032103", "T032109", "T032106", "T032107", "T019890", "T019891", "T032101", "T018980", "T018981", "T021677", "T022844", "T018983", "T021676", "T028705", "T028706", "T027359", "T032113", "T032111", "T032112", "T032110", "T022835", "T018979", "T024990" ], "last_affected": [ "T028707", "T032108" ] }, "release_date": "2024-01-16T23:00:00Z", "title": "CVE-2023-42503" }, { "cve": "CVE-2023-34034", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T032104", "T032105", "T032102", "T032103", "T032109", "T032106", "T032107", "T019890", "T019891", "T032101", "T018980", "T018981", "T021677", "T022844", "T018983", "T021676", "T028705", "T028706", "T027359", "T032113", "T032111", "T032112", "T032110", "T022835", "T018979", "T024990" ], "last_affected": [ "T028707", "T032108" ] }, "release_date": "2024-01-16T23:00:00Z", "title": "CVE-2023-34034" }, { "cve": "CVE-2023-33201", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T032104", "T032105", "T032102", "T032103", "T032109", "T032106", "T032107", "T019890", "T019891", "T032101", "T018980", "T018981", "T021677", "T022844", "T018983", "T021676", "T028705", "T028706", "T027359", "T032113", "T032111", "T032112", "T032110", "T022835", "T018979", "T024990" ], "last_affected": [ "T028707", "T032108" ] }, "release_date": "2024-01-16T23:00:00Z", "title": "CVE-2023-33201" }, { "cve": "CVE-2023-2976", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T032104", "T032105", "T032102", "T032103", "T032109", "T032106", "T032107", "T019890", "T019891", "T032101", "T018980", "T018981", "T021677", "T022844", "T018983", "T021676", "T028705", "T028706", "T027359", "T032113", "T032111", "T032112", "T032110", "T022835", "T018979", "T024990" ], "last_affected": [ "T028707", "T032108" ] }, "release_date": "2024-01-16T23:00:00Z", "title": "CVE-2023-2976" }, { "cve": "CVE-2023-2618", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T032104", "T032105", "T032102", "T032103", "T032109", "T032106", "T032107", "T019890", "T019891", "T032101", "T018980", "T018981", "T021677", "T022844", "T018983", "T021676", "T028705", "T028706", "T027359", "T032113", "T032111", "T032112", "T032110", "T022835", "T018979", "T024990" ], "last_affected": [ "T028707", "T032108" ] }, "release_date": "2024-01-16T23:00:00Z", "title": "CVE-2023-2618" }, { "cve": "CVE-2023-24998", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T032104", "T032105", "T032102", "T032103", "T032109", "T032106", "T032107", "T019890", "T019891", "T032101", "T018980", "T018981", "T021677", "T022844", "T018983", "T021676", "T028705", "T028706", "T027359", "T032113", "T032111", "T032112", "T032110", "T022835", "T018979", "T024990" ], "last_affected": [ "T028707", "T032108" ] }, "release_date": "2024-01-16T23:00:00Z", "title": "CVE-2023-24998" }, { "cve": "CVE-2023-21901", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T032104", "T032105", "T032102", "T032103", "T032109", "T032106", "T032107", "T019890", "T019891", "T032101", "T018980", "T018981", "T021677", "T022844", "T018983", "T021676", "T028705", "T028706", "T027359", "T032113", "T032111", "T032112", "T032110", "T022835", "T018979", "T024990" ], "last_affected": [ "T028707", "T032108" ] }, "release_date": "2024-01-16T23:00:00Z", "title": "CVE-2023-21901" }, { "cve": "CVE-2023-1436", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T032104", "T032105", "T032102", "T032103", "T032109", "T032106", "T032107", "T019890", "T019891", "T032101", "T018980", "T018981", "T021677", "T022844", "T018983", "T021676", "T028705", "T028706", "T027359", "T032113", "T032111", "T032112", "T032110", "T022835", "T018979", "T024990" ], "last_affected": [ "T028707", "T032108" ] }, "release_date": "2024-01-16T23:00:00Z", "title": "CVE-2023-1436" }, { "cve": "CVE-2023-1370", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T032104", "T032105", "T032102", "T032103", "T032109", "T032106", "T032107", "T019890", "T019891", "T032101", "T018980", "T018981", "T021677", "T022844", "T018983", "T021676", "T028705", "T028706", "T027359", "T032113", "T032111", "T032112", "T032110", "T022835", "T018979", "T024990" ], "last_affected": [ "T028707", "T032108" ] }, "release_date": "2024-01-16T23:00:00Z", "title": "CVE-2023-1370" }, { "cve": "CVE-2022-44729", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T032104", "T032105", "T032102", "T032103", "T032109", "T032106", "T032107", "T019890", "T019891", "T032101", "T018980", "T018981", "T021677", "T022844", "T018983", "T021676", "T028705", "T028706", "T027359", "T032113", "T032111", "T032112", "T032110", "T022835", "T018979", "T024990" ], "last_affected": [ "T028707", "T032108" ] }, "release_date": "2024-01-16T23:00:00Z", "title": "CVE-2022-44729" }, { "cve": "CVE-2022-42920", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T032104", "T032105", "T032102", "T032103", "T032109", "T032106", "T032107", "T019890", "T019891", "T032101", "T018980", "T018981", "T021677", "T022844", "T018983", "T021676", "T028705", "T028706", "T027359", "T032113", "T032111", "T032112", "T032110", "T022835", "T018979", "T024990" ], "last_affected": [ "T028707", "T032108" ] }, "release_date": "2024-01-16T23:00:00Z", "title": "CVE-2022-42920" }, { "cve": "CVE-2022-42003", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T032104", "T032105", "T032102", "T032103", "T032109", "T032106", "T032107", "T019890", "T019891", "T032101", "T018980", "T018981", "T021677", "T022844", "T018983", "T021676", "T028705", "T028706", "T027359", "T032113", "T032111", "T032112", "T032110", "T022835", "T018979", "T024990" ], "last_affected": [ "T028707", "T032108" ] }, "release_date": "2024-01-16T23:00:00Z", "title": "CVE-2022-42003" }, { "cve": "CVE-2022-36944", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T032104", "T032105", "T032102", "T032103", "T032109", "T032106", "T032107", "T019890", "T019891", "T032101", "T018980", "T018981", "T021677", "T022844", "T018983", "T021676", "T028705", "T028706", "T027359", "T032113", "T032111", "T032112", "T032110", "T022835", "T018979", "T024990" ], "last_affected": [ "T028707", "T032108" ] }, "release_date": "2024-01-16T23:00:00Z", "title": "CVE-2022-36944" }, { "cve": "CVE-2022-36033", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T032104", "T032105", "T032102", "T032103", "T032109", "T032106", "T032107", "T019890", "T019891", "T032101", "T018980", "T018981", "T021677", "T022844", "T018983", "T021676", "T028705", "T028706", "T027359", "T032113", "T032111", "T032112", "T032110", "T022835", "T018979", "T024990" ], "last_affected": [ "T028707", "T032108" ] }, "release_date": "2024-01-16T23:00:00Z", "title": "CVE-2022-36033" }, { "cve": "CVE-2022-34169", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T032104", "T032105", "T032102", "T032103", "T032109", "T032106", "T032107", "T019890", "T019891", "T032101", "T018980", "T018981", "T021677", "T022844", "T018983", "T021676", "T028705", "T028706", "T027359", "T032113", "T032111", "T032112", "T032110", "T022835", "T018979", "T024990" ], "last_affected": [ "T028707", "T032108" ] }, "release_date": "2024-01-16T23:00:00Z", "title": "CVE-2022-34169" }, { "cve": "CVE-2022-31692", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T032104", "T032105", "T032102", "T032103", "T032109", "T032106", "T032107", "T019890", "T019891", "T032101", "T018980", "T018981", "T021677", "T022844", "T018983", "T021676", "T028705", "T028706", "T027359", "T032113", "T032111", "T032112", "T032110", "T022835", "T018979", "T024990" ], "last_affected": [ "T028707", "T032108" ] }, "release_date": "2024-01-16T23:00:00Z", "title": "CVE-2022-31692" }, { "cve": "CVE-2022-31160", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T032104", "T032105", "T032102", "T032103", "T032109", "T032106", "T032107", "T019890", "T019891", "T032101", "T018980", "T018981", "T021677", "T022844", "T018983", "T021676", "T028705", "T028706", "T027359", "T032113", "T032111", "T032112", "T032110", "T022835", "T018979", "T024990" ], "last_affected": [ "T028707", "T032108" ] }, "release_date": "2024-01-16T23:00:00Z", "title": "CVE-2022-31160" }, { "cve": "CVE-2022-25147", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T032104", "T032105", "T032102", "T032103", "T032109", "T032106", "T032107", "T019890", "T019891", "T032101", "T018980", "T018981", "T021677", "T022844", "T018983", "T021676", "T028705", "T028706", "T027359", "T032113", "T032111", "T032112", "T032110", "T022835", "T018979", "T024990" ], "last_affected": [ "T028707", "T032108" ] }, "release_date": "2024-01-16T23:00:00Z", "title": "CVE-2022-25147" }, { "cve": "CVE-2022-22979", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T032104", "T032105", "T032102", "T032103", "T032109", "T032106", "T032107", "T019890", "T019891", "T032101", "T018980", "T018981", "T021677", "T022844", "T018983", "T021676", "T028705", "T028706", "T027359", "T032113", "T032111", "T032112", "T032110", "T022835", "T018979", "T024990" ], "last_affected": [ "T028707", "T032108" ] }, "release_date": "2024-01-16T23:00:00Z", "title": "CVE-2022-22979" }, { "cve": "CVE-2022-22969", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T032104", "T032105", "T032102", "T032103", "T032109", "T032106", "T032107", "T019890", "T019891", "T032101", "T018980", "T018981", "T021677", "T022844", "T018983", "T021676", "T028705", "T028706", "T027359", "T032113", "T032111", "T032112", "T032110", "T022835", "T018979", "T024990" ], "last_affected": [ "T028707", "T032108" ] }, "release_date": "2024-01-16T23:00:00Z", "title": "CVE-2022-22969" }, { "cve": "CVE-2020-5410", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T032104", "T032105", "T032102", "T032103", "T032109", "T032106", "T032107", "T019890", "T019891", "T032101", "T018980", "T018981", "T021677", "T022844", "T018983", "T021676", "T028705", "T028706", "T027359", "T032113", "T032111", "T032112", "T032110", "T022835", "T018979", "T024990" ], "last_affected": [ "T028707", "T032108" ] }, "release_date": "2024-01-16T23:00:00Z", "title": "CVE-2020-5410" }, { "cve": "CVE-2020-15250", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T032104", "T032105", "T032102", "T032103", "T032109", "T032106", "T032107", "T019890", "T019891", "T032101", "T018980", "T018981", "T021677", "T022844", "T018983", "T021676", "T028705", "T028706", "T027359", "T032113", "T032111", "T032112", "T032110", "T022835", "T018979", "T024990" ], "last_affected": [ "T028707", "T032108" ] }, "release_date": "2024-01-16T23:00:00Z", "title": "CVE-2020-15250" } ] }
wid-sec-w-2024-0890
Vulnerability from csaf_certbund
Published
2024-04-16 22:00
Modified
2024-04-16 22:00
Summary
Oracle Supply Chain: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Die Oracle Supply Chain ist eine Sammlung von Applikationen für verschiedene Zwecke.
Angriff
Ein Angreifer kann mehrere Schwachstellen in Oracle Supply Chain ausnutzen, um die Vertraulichkeit, Integrität und Verfügbarkeit zu gefährden.
Betroffene Betriebssysteme
- Linux
- UNIX
- Windows
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Die Oracle Supply Chain ist eine Sammlung von Applikationen f\u00fcr verschiedene Zwecke.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Oracle Supply Chain ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0890 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0890.json" }, { "category": "self", "summary": "WID-SEC-2024-0890 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0890" }, { "category": "external", "summary": "Oracle Critical Patch Update Advisory - April 2024 - Appendix Oracle Supply Chain vom 2024-04-16", "url": "https://www.oracle.com/security-alerts/cpuapr2024.html#AppendixSCP" } ], "source_lang": "en-US", "title": "Oracle Supply Chain: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-04-16T22:00:00.000+00:00", "generator": { "date": "2024-04-17T10:37:15.400+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2024-0890", "initial_release_date": "2024-04-16T22:00:00.000+00:00", "revision_history": [ { "date": "2024-04-16T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "9.3.6", "product": { "name": "Oracle Supply Chain 9.3.6", "product_id": "T019052", "product_identification_helper": { "cpe": "cpe:/a:oracle:supply_chain:9.3.6" } } }, { "category": "product_version", "name": "6.2.4.2", "product": { "name": "Oracle Supply Chain 6.2.4.2", "product_id": "T032129", "product_identification_helper": { "cpe": "cpe:/a:oracle:supply_chain:6.2.4.2" } } }, { "category": "product_version", "name": "6.5.2", "product": { "name": "Oracle Supply Chain 6.5.2", "product_id": "T034190", "product_identification_helper": { "cpe": "cpe:/a:oracle:supply_chain:6.5.2" } } }, { "category": "product_version", "name": "6.5.3", "product": { "name": "Oracle Supply Chain 6.5.3", "product_id": "T034191", "product_identification_helper": { "cpe": "cpe:/a:oracle:supply_chain:6.5.3" } } } ], "category": "product_name", "name": "Supply Chain" } ], "category": "vendor", "name": "Oracle" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-34169", "notes": [ { "category": "description", "text": "In Oracle Supply Chain existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL-HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T034190", "T032129", "T034191", "T019052" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2022-34169" }, { "cve": "CVE-2023-24998", "notes": [ { "category": "description", "text": "In Oracle Supply Chain existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL-HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T034190", "T032129", "T034191", "T019052" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2023-24998" }, { "cve": "CVE-2023-42503", "notes": [ { "category": "description", "text": "In Oracle Supply Chain existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL-HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T034190", "T032129", "T034191", "T019052" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2023-42503" }, { "cve": "CVE-2023-46589", "notes": [ { "category": "description", "text": "In Oracle Supply Chain existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL-HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T034190", "T032129", "T034191", "T019052" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2023-46589" }, { "cve": "CVE-2024-21091", "notes": [ { "category": "description", "text": "In Oracle Supply Chain existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL-HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T034190", "T032129", "T034191", "T019052" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2024-21091" }, { "cve": "CVE-2024-21092", "notes": [ { "category": "description", "text": "In Oracle Supply Chain existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL-HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T034190", "T032129", "T034191", "T019052" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2024-21092" } ] }
WID-SEC-W-2023-0553
Vulnerability from csaf_certbund
Published
2023-03-02 23:00
Modified
2023-03-02 23:00
Summary
IBM Business Automation Workflow: Schwachstelle ermöglicht Codeausführung
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
IBM Business Automation Workflow ist eine Lösung zur Automatisierung von Arbeitsabläufen.
Angriff
Ein entfernter, anonymer Angreifer kann eine Schwachstelle in IBM Business Automation Workflow ausnutzen, um beliebigen Programmcode auszuführen.
Betroffene Betriebssysteme
- Linux
- Windows
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "IBM Business Automation Workflow ist eine L\u00f6sung zur Automatisierung von Arbeitsabl\u00e4ufen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann eine Schwachstelle in IBM Business Automation Workflow ausnutzen, um beliebigen Programmcode auszuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-0553 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-0553.json" }, { "category": "self", "summary": "WID-SEC-2023-0553 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0553" }, { "category": "external", "summary": "IBM Security Bulletin: 6959667 vom 2023-03-02", "url": "https://www.ibm.com/support/pages/node/6959667" } ], "source_lang": "en-US", "title": "IBM Business Automation Workflow: Schwachstelle erm\u00f6glicht Codeausf\u00fchrung", "tracking": { "current_release_date": "2023-03-02T23:00:00.000+00:00", "generator": { "date": "2024-02-15T17:17:49.884+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-0553", "initial_release_date": "2023-03-02T23:00:00.000+00:00", "revision_history": [ { "date": "2023-03-02T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "IBM Business Automation Workflow \u003c V22.0.2", "product": { "name": "IBM Business Automation Workflow \u003c V22.0.2", "product_id": "T026609", "product_identification_helper": { "cpe": "cpe:/a:ibm:business_automation_workflow:v22.0.2" } } }, { "category": "product_name", "name": "IBM Business Automation Workflow \u003c V21.0.3.1", "product": { "name": "IBM Business Automation Workflow \u003c V21.0.3.1", "product_id": "T026610", "product_identification_helper": { "cpe": "cpe:/a:ibm:business_automation_workflow:v21.0.3.1" } } }, { "category": "product_name", "name": "IBM Business Automation Workflow \u003c V20.0.0.2", "product": { "name": "IBM Business Automation Workflow \u003c V20.0.0.2", "product_id": "T026611", "product_identification_helper": { "cpe": "cpe:/a:ibm:business_automation_workflow:v20.0.0.2" } } } ], "category": "product_name", "name": "Business Automation Workflow" } ], "category": "vendor", "name": "IBM" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-34169", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in IBM Business Automation Workflow. In der Komponente \"Apache Xalan\" besteht ein Fehler bez\u00fcglich einer Integer Truncation. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um beliebigen Programmcode auszuf\u00fchren." } ], "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-34169" } ] }
wid-sec-w-2023-1017
Vulnerability from csaf_certbund
Published
2023-04-18 22:00
Modified
2023-04-18 22:00
Summary
Oracle Financial Services Applications: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Oracle Financial Services ist eine Zusammenstellung von Anwendungen für den Finanzsektor und eine Technologiebasis zur Erfüllung von IT- und Geschäftsanforderungen.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Oracle Financial Services Applications ausnutzen, um die Vertraulichkeit, Integrität und Verfügbarkeit zu gefährden.
Betroffene Betriebssysteme
- UNIX
- Linux
- Windows
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Oracle Financial Services ist eine Zusammenstellung von Anwendungen f\u00fcr den Finanzsektor und eine Technologiebasis zur Erf\u00fcllung von IT- und Gesch\u00e4ftsanforderungen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Oracle Financial Services Applications ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-1017 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1017.json" }, { "category": "self", "summary": "WID-SEC-2023-1017 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1017" }, { "category": "external", "summary": "Oracle Critical Patch Update Advisory - April 2023 - Appendix Oracle Financial Services Applications vom 2023-04-18", "url": "https://www.oracle.com/security-alerts/cpuapr2023.html#AppendixIFLX" } ], "source_lang": "en-US", "title": "Oracle Financial Services Applications: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-04-18T22:00:00.000+00:00", "generator": { "date": "2024-02-15T17:24:35.044+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-1017", "initial_release_date": "2023-04-18T22:00:00.000+00:00", "revision_history": [ { "date": "2023-04-18T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Oracle Financial Services Applications 2.7.1", "product": { "name": "Oracle Financial Services Applications 2.7.1", "product_id": "T018979", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:2.7.1" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 11.7", "product": { "name": "Oracle Financial Services Applications 11.7", "product_id": "T020695", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:11.7" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 11.8", "product": { "name": "Oracle Financial Services Applications 11.8", "product_id": "T020696", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:11.8" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 11.10", "product": { "name": "Oracle Financial Services Applications 11.10", "product_id": "T020698", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:11.10" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 18.3", "product": { "name": "Oracle Financial Services Applications 18.3", "product_id": "T021669", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:18.3" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 19.1", "product": { "name": "Oracle Financial Services Applications 19.1", "product_id": "T021670", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:19.1" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 19.2", "product": { "name": "Oracle Financial Services Applications 19.2", "product_id": "T021671", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:19.2" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 21.1", "product": { "name": "Oracle Financial Services Applications 21.1", "product_id": "T021673", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:21.1" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.1.1.0", "product": { "name": "Oracle Financial Services Applications 8.1.1.0", "product_id": "T022833", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.1.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.1.2.0", "product": { "name": "Oracle Financial Services Applications 8.1.2.0", "product_id": "T022834", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.2.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.1.1.1", "product": { "name": "Oracle Financial Services Applications 8.1.1.1", "product_id": "T022835", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.1.1" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.0.9.0", "product": { "name": "Oracle Financial Services Applications 8.0.9.0", "product_id": "T022840", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.0.9.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.0.8.0", "product": { "name": "Oracle Financial Services Applications 8.0.8.0", "product_id": "T022841", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.0.8.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.0.8.1", "product": { "name": "Oracle Financial Services Applications 8.0.8.1", "product_id": "T022844", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.0.8.1" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.1.0.0", "product": { "name": "Oracle Financial Services Applications 8.1.0.0", "product_id": "T023923", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.0.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.1.2.1", "product": { "name": "Oracle Financial Services Applications 8.1.2.1", "product_id": "T023924", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.2.1" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.0.7.0", "product": { "name": "Oracle Financial Services Applications 8.0.7.0", "product_id": "T023925", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.0.7.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 2.7", "product": { "name": "Oracle Financial Services Applications 2.7", "product_id": "T023927", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:2.7" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 2.9", "product": { "name": "Oracle Financial Services Applications 2.9", "product_id": "T023928", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:2.9" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.1.2.2", "product": { "name": "Oracle Financial Services Applications 8.1.2.2", "product_id": "T024988", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.2.2" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.0.8.2", "product": { "name": "Oracle Financial Services Applications 8.0.8.2", "product_id": "T024990", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.0.8.2" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.0.8.3.1", "product": { "name": "Oracle Financial Services Applications 8.0.8.3.1", "product_id": "T025878", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.0.8.3.1" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications \u003c= 14.7", "product": { "name": "Oracle Financial Services Applications \u003c= 14.7", "product_id": "T027348", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:14.7" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 22.1", "product": { "name": "Oracle Financial Services Applications 22.1", "product_id": "T027349", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:22.1" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 22.2", "product": { "name": "Oracle Financial Services Applications 22.2", "product_id": "T027350", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:22.2" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.1.2.4", "product": { "name": "Oracle Financial Services Applications 8.1.2.4", "product_id": "T027351", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.2.4" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.1.2.3", "product": { "name": "Oracle Financial Services Applications 8.1.2.3", "product_id": "T027352", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.2.3" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 2.8", "product": { "name": "Oracle Financial Services Applications 2.8", "product_id": "T027353", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:2.8" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 18.2", "product": { "name": "Oracle Financial Services Applications 18.2", "product_id": "T027354", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:18.2" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.1.2.4.1", "product": { "name": "Oracle Financial Services Applications 8.1.2.4.1", "product_id": "T027358", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.2.4.1" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 2.9.1", "product": { "name": "Oracle Financial Services Applications 2.9.1", "product_id": "T027359", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:2.9.1" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 3.0", "product": { "name": "Oracle Financial Services Applications 3.0", "product_id": "T027360", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:3.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 3.1", "product": { "name": "Oracle Financial Services Applications 3.1", "product_id": "T027361", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:3.1" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 3.2", "product": { "name": "Oracle Financial Services Applications 3.2", "product_id": "T027362", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:3.2" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 4.0", "product": { "name": "Oracle Financial Services Applications 4.0", "product_id": "T027363", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:4.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.0.8.0.0", "product": { "name": "Oracle Financial Services Applications 8.0.8.0.0", "product_id": "T027364", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.0.8.0.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 11.6", "product": { "name": "Oracle Financial Services Applications 11.6", "product_id": "T027365", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:11.6" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 11.11", "product": { "name": "Oracle Financial Services Applications 11.11", "product_id": "T027366", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:11.11" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.0.7.1.2", "product": { "name": "Oracle Financial Services Applications 8.0.7.1.2", "product_id": "T027367", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.0.7.1.2" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.1.1.1.7", "product": { "name": "Oracle Financial Services Applications 8.1.1.1.7", "product_id": "T027368", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.1.1.7" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.0.7.8.0", "product": { "name": "Oracle Financial Services Applications 8.0.7.8.0", "product_id": "T027369", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.0.7.8.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.1.1.1.1", "product": { "name": "Oracle Financial Services Applications 8.1.1.1.1", "product_id": "T027370", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.1.1.1" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.0.8.1.4", "product": { "name": "Oracle Financial Services Applications 8.0.8.1.4", "product_id": "T027371", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.0.8.1.4" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.1.0.1.4", "product": { "name": "Oracle Financial Services Applications 8.1.0.1.4", "product_id": "T027372", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.0.1.4" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.1.2.2.1", "product": { "name": "Oracle Financial Services Applications 8.1.2.2.1", "product_id": "T027373", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.2.2.1" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.0.7.3.1", "product": { "name": "Oracle Financial Services Applications 8.0.7.3.1", "product_id": "T027374", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.0.7.3.1" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.0.7.8.1", "product": { "name": "Oracle Financial Services Applications 8.0.7.8.1", "product_id": "T027375", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.0.7.8.1" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.0.8.2.1", "product": { "name": "Oracle Financial Services Applications 8.0.8.2.1", "product_id": "T027376", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.0.8.2.1" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.1.1.2.0", "product": { "name": "Oracle Financial Services Applications 8.1.1.2.0", "product_id": "T027377", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.1.2.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.0.8.3.5", "product": { "name": "Oracle Financial Services Applications 8.0.8.3.5", "product_id": "T027378", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.0.8.3.5" } } } ], "category": "product_name", "name": "Financial Services Applications" } ], "category": "vendor", "name": "Oracle" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-28708", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2023-28708" }, { "cve": "CVE-2023-25194", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2023-25194" }, { "cve": "CVE-2023-24998", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2023-24998" }, { "cve": "CVE-2023-21915", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2023-21915" }, { "cve": "CVE-2023-21908", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2023-21908" }, { "cve": "CVE-2023-21907", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2023-21907" }, { "cve": "CVE-2023-21906", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2023-21906" }, { "cve": "CVE-2023-21905", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2023-21905" }, { "cve": "CVE-2023-21904", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2023-21904" }, { "cve": "CVE-2023-21903", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2023-21903" }, { "cve": "CVE-2023-21902", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2023-21902" }, { "cve": "CVE-2022-46908", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-46908" }, { "cve": "CVE-2022-46364", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-46364" }, { "cve": "CVE-2022-43680", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-43680" }, { "cve": "CVE-2022-42890", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-42890" }, { "cve": "CVE-2022-42889", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-42889" }, { "cve": "CVE-2022-42252", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-42252" }, { "cve": "CVE-2022-42003", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-42003" }, { "cve": "CVE-2022-41881", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-41881" }, { "cve": "CVE-2022-40146", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-40146" }, { "cve": "CVE-2022-38752", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-38752" }, { "cve": "CVE-2022-36033", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-36033" }, { "cve": "CVE-2022-34169", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-34169" }, { "cve": "CVE-2022-3171", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-3171" }, { "cve": "CVE-2022-29577", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-29577" }, { "cve": "CVE-2022-25647", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-25647" }, { "cve": "CVE-2022-24839", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-24839" }, { "cve": "CVE-2022-23437", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-23437" }, { "cve": "CVE-2022-22979", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-22979" }, { "cve": "CVE-2022-22978", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-22978" }, { "cve": "CVE-2022-22971", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-22971" }, { "cve": "CVE-2022-2048", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-2048" }, { "cve": "CVE-2021-43859", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2021-43859" }, { "cve": "CVE-2021-41184", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2021-41184" }, { "cve": "CVE-2021-36090", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2021-36090" }, { "cve": "CVE-2021-29425", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2021-29425" }, { "cve": "CVE-2020-11988", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2020-11988" }, { "cve": "CVE-2019-12415", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2019-12415" } ] }
WID-SEC-W-2023-2368
Vulnerability from csaf_certbund
Published
2023-09-14 22:00
Modified
2024-01-07 23:00
Summary
IBM Operational Decision Manager: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
IBM Operational Decision Manager ist Software für die Integration von Geschäftsereignissen und Geschäftsregeln, um Entscheidungen über verschiedene Prozesse und Anwendungen hinweg zu automatisieren.
Angriff
Ein entfernter authentifizierter Angreifer kann mehrere Schwachstellen in IBM Operational Decision Manager ausnutzen, um Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen oder vertrauliche Informationen offenzulegen.
Betroffene Betriebssysteme
- Linux
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "IBM Operational Decision Manager ist Software f\u00fcr die Integration von Gesch\u00e4ftsereignissen und Gesch\u00e4ftsregeln, um Entscheidungen \u00fcber verschiedene Prozesse und Anwendungen hinweg zu automatisieren.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter authentifizierter Angreifer kann mehrere Schwachstellen in IBM Operational Decision Manager ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen oder vertrauliche Informationen offenzulegen.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-2368 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-2368.json" }, { "category": "self", "summary": "WID-SEC-2023-2368 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2368" }, { "category": "external", "summary": "IBM Security Bulletin - 7032928 vom 2023-09-14", "url": "https://www.ibm.com/support/pages/node/7032928" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:6138 vom 2023-10-26", "url": "https://access.redhat.com/errata/RHSA-2023:6138" }, { "category": "external", "summary": "IBM Security Bulletin 7105614 vom 2024-01-08", "url": "https://www.ibm.com/support/pages/node/7105614" } ], "source_lang": "en-US", "title": "IBM Operational Decision Manager: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-01-07T23:00:00.000+00:00", "generator": { "date": "2024-02-15T17:44:18.727+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-2368", "initial_release_date": "2023-09-14T22:00:00.000+00:00", "revision_history": [ { "date": "2023-09-14T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-10-26T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-01-07T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von IBM aufgenommen" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "IBM Operational Decision Manager \u003c 8.10.5.1", "product": { "name": "IBM Operational Decision Manager \u003c 8.10.5.1", "product_id": "T029909", "product_identification_helper": { "cpe": "cpe:/a:ibm:operational_decision_manager:8.10.5.1" } } }, { "category": "product_name", "name": "IBM Operational Decision Manager \u003c 8.11.0.1", "product": { "name": "IBM Operational Decision Manager \u003c 8.11.0.1", "product_id": "T029910", "product_identification_helper": { "cpe": "cpe:/a:ibm:operational_decision_manager:8.11.0.1" } } }, { "category": "product_name", "name": "IBM Operational Decision Manager \u003c 8.11.1", "product": { "name": "IBM Operational Decision Manager \u003c 8.11.1", "product_id": "T029911", "product_identification_helper": { "cpe": "cpe:/a:ibm:operational_decision_manager:8.11.1" } } }, { "category": "product_name", "name": "IBM Operational Decision Manager \u003c 8.12.0", "product": { "name": "IBM Operational Decision Manager \u003c 8.12.0", "product_id": "T029912", "product_identification_helper": { "cpe": "cpe:/a:ibm:operational_decision_manager:8.12.0" } } }, { "category": "product_name", "name": "IBM Operational Decision Manager 8.10.5.1 \u003c IF049", "product": { "name": "IBM Operational Decision Manager 8.10.5.1 \u003c IF049", "product_id": "T031894", "product_identification_helper": { "cpe": "cpe:/a:ibm:operational_decision_manager:8.10.5.1__if049" } } } ], "category": "product_name", "name": "Operational Decision Manager" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-2047", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in IBM Operational Decision Manager. Dieser Fehler besteht in der HttpURI-Klasse der Eclipse Jetty-Komponente. Durch das Senden einer speziell gestalteten Anfrage kann ein Angreifer diese Schwachstelle ausnutzen, um die Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "T031894", "67646" ] }, "release_date": "2023-09-14T22:00:00Z", "title": "CVE-2022-2047" }, { "cve": "CVE-2014-0107", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in IBM Operational Decision Manager. Dieser Fehler besteht in der Apache Xalan-Java-Komponente aufgrund einer unsachgem\u00e4\u00dfen Behandlung von Ausgabeeigenschaften. Ein entfernter Angreifer kann diese Schwachstelle zur Umgehung von Sicherheitsma\u00dfnahmen ausnutzen." } ], "product_status": { "known_affected": [ "T031894", "67646" ] }, "release_date": "2023-09-14T22:00:00Z", "title": "CVE-2014-0107" }, { "cve": "CVE-2022-25881", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in IBM Operational Decision Manager. Dieser Fehler besteht im Node.js http-cache-semantics-Modul aufgrund eines Denial of Service (ReDoS) durch regul\u00e4re Ausdr\u00fccke. Durch das Senden einer speziell gestalteten Regex-Eingabe unter Verwendung von Request-Header-Werten kann ein entfernter Angreifer diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu verursachen." } ], "product_status": { "known_affected": [ "T031894", "67646" ] }, "release_date": "2023-09-14T22:00:00Z", "title": "CVE-2022-25881" }, { "cve": "CVE-2022-34169", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in IBM Operational Decision Manager. Dieser Fehler besteht in der Apache Xalan Java XSLT Bibliothekskomponente aufgrund eines Integer Truncation Problems bei der Verarbeitung von b\u00f6sartigen XSLT Stylesheets. Ein entfernter Angreifer kann diese Schwachstelle zur Ausf\u00fchrung von beliebigem Code ausnutzen" } ], "product_status": { "known_affected": [ "T031894", "67646" ] }, "release_date": "2023-09-14T22:00:00Z", "title": "CVE-2022-34169" }, { "cve": "CVE-2022-41946", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in IBM Operational Decision Manager. Dieser Fehler besteht in der Postgresql JDBC-Komponente aufgrund eines nicht eingeschr\u00e4nkten Zugriffs zum Erstellen lesbarer Dateien im TemporaryFolder. Durch das Senden einer speziell gestalteten Anfrage kann ein Angreifer diese Schwachstelle ausnutzen, um vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T031894", "67646" ] }, "release_date": "2023-09-14T22:00:00Z", "title": "CVE-2022-41946" }, { "cve": "CVE-2023-34034", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in IBM Operational Decision Manager. Dieser Fehler besteht in der Komponente VMware Tanzu Spring Security aufgrund einer unsachgem\u00e4\u00dfen Validierung von Benutzereingaben. Mit einer speziell gestalteten Konfiguration kann ein Angreifer diese Schwachstelle ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "T031894", "67646" ] }, "release_date": "2023-09-14T22:00:00Z", "title": "CVE-2023-34034" }, { "cve": "CVE-2023-37460", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in IBM Operational Decision Manager. Dieser Fehler besteht in der Komponente Plexus Archiver aufgrund der Verfolgung eines symbolischen Links in der Funktion resolveFile(). Durch Extrahieren einer speziell gestalteten Archivdatei, die einen symbolischen Link enth\u00e4lt, mit AbstractUnArchiver kann ein Angreifer diese Schwachstelle ausnutzen, um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T031894", "67646" ] }, "release_date": "2023-09-14T22:00:00Z", "title": "CVE-2023-37460" } ] }
wid-sec-w-2023-0553
Vulnerability from csaf_certbund
Published
2023-03-02 23:00
Modified
2023-03-02 23:00
Summary
IBM Business Automation Workflow: Schwachstelle ermöglicht Codeausführung
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
IBM Business Automation Workflow ist eine Lösung zur Automatisierung von Arbeitsabläufen.
Angriff
Ein entfernter, anonymer Angreifer kann eine Schwachstelle in IBM Business Automation Workflow ausnutzen, um beliebigen Programmcode auszuführen.
Betroffene Betriebssysteme
- Linux
- Windows
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "IBM Business Automation Workflow ist eine L\u00f6sung zur Automatisierung von Arbeitsabl\u00e4ufen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann eine Schwachstelle in IBM Business Automation Workflow ausnutzen, um beliebigen Programmcode auszuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-0553 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-0553.json" }, { "category": "self", "summary": "WID-SEC-2023-0553 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0553" }, { "category": "external", "summary": "IBM Security Bulletin: 6959667 vom 2023-03-02", "url": "https://www.ibm.com/support/pages/node/6959667" } ], "source_lang": "en-US", "title": "IBM Business Automation Workflow: Schwachstelle erm\u00f6glicht Codeausf\u00fchrung", "tracking": { "current_release_date": "2023-03-02T23:00:00.000+00:00", "generator": { "date": "2024-02-15T17:17:49.884+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-0553", "initial_release_date": "2023-03-02T23:00:00.000+00:00", "revision_history": [ { "date": "2023-03-02T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "IBM Business Automation Workflow \u003c V22.0.2", "product": { "name": "IBM Business Automation Workflow \u003c V22.0.2", "product_id": "T026609", "product_identification_helper": { "cpe": "cpe:/a:ibm:business_automation_workflow:v22.0.2" } } }, { "category": "product_name", "name": "IBM Business Automation Workflow \u003c V21.0.3.1", "product": { "name": "IBM Business Automation Workflow \u003c V21.0.3.1", "product_id": "T026610", "product_identification_helper": { "cpe": "cpe:/a:ibm:business_automation_workflow:v21.0.3.1" } } }, { "category": "product_name", "name": "IBM Business Automation Workflow \u003c V20.0.0.2", "product": { "name": "IBM Business Automation Workflow \u003c V20.0.0.2", "product_id": "T026611", "product_identification_helper": { "cpe": "cpe:/a:ibm:business_automation_workflow:v20.0.0.2" } } } ], "category": "product_name", "name": "Business Automation Workflow" } ], "category": "vendor", "name": "IBM" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-34169", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in IBM Business Automation Workflow. In der Komponente \"Apache Xalan\" besteht ein Fehler bez\u00fcglich einer Integer Truncation. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um beliebigen Programmcode auszuf\u00fchren." } ], "release_date": "2023-03-02T23:00:00Z", "title": "CVE-2022-34169" } ] }
wid-sec-w-2024-0899
Vulnerability from csaf_certbund
Published
2024-04-16 22:00
Modified
2024-04-16 22:00
Summary
Oracle Fusion Middleware: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Oracle Fusion Middleware bündelt mehrere Produkte zur Erstellung, Betrieb und Management von intelligenten Business Anwendungen.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Oracle Fusion Middleware ausnutzen, um die Vertraulichkeit, Integrität und Verfügbarkeit zu gefährden.
Betroffene Betriebssysteme
- Linux
- UNIX
- Windows
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Oracle Fusion Middleware b\u00fcndelt mehrere Produkte zur Erstellung, Betrieb und Management von intelligenten Business Anwendungen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Oracle Fusion Middleware ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0899 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0899.json" }, { "category": "self", "summary": "WID-SEC-2024-0899 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0899" }, { "category": "external", "summary": "Oracle Critical Patch Update Advisory - April 2024 - Appendix Oracle Fusion Middleware vom 2024-04-16", "url": "https://www.oracle.com/security-alerts/cpuapr2024.html#AppendixFMW" } ], "source_lang": "en-US", "title": "Oracle Fusion Middleware: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-04-16T22:00:00.000+00:00", "generator": { "date": "2024-04-17T10:37:23.833+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2024-0899", "initial_release_date": "2024-04-16T22:00:00.000+00:00", "revision_history": [ { "date": "2024-04-16T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "12.2.1.3.0", "product": { "name": "Oracle Fusion Middleware 12.2.1.3.0", "product_id": "618028", "product_identification_helper": { "cpe": "cpe:/a:oracle:fusion_middleware:12.2.1.3.0" } } }, { "category": "product_version", "name": "12.2.1.4.0", "product": { "name": "Oracle Fusion Middleware 12.2.1.4.0", "product_id": "751674", "product_identification_helper": { "cpe": "cpe:/a:oracle:fusion_middleware:12.2.1.4.0" } } }, { "category": "product_version", "name": "14.1.1.0.0", "product": { "name": "Oracle Fusion Middleware 14.1.1.0.0", "product_id": "829576", "product_identification_helper": { "cpe": "cpe:/a:oracle:fusion_middleware:14.1.1.0.0" } } }, { "category": "product_version", "name": "8.5.6", "product": { "name": "Oracle Fusion Middleware 8.5.6", "product_id": "T024993", "product_identification_helper": { "cpe": "cpe:/a:oracle:fusion_middleware:8.5.6" } } }, { "category": "product_version", "name": "8.5.7", "product": { "name": "Oracle Fusion Middleware 8.5.7", "product_id": "T034057", "product_identification_helper": { "cpe": "cpe:/a:oracle:fusion_middleware:8.5.7" } } } ], "category": "product_name", "name": "Fusion Middleware" } ], "category": "vendor", "name": "Oracle" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-0231", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2019-0231" }, { "cve": "CVE-2019-10172", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2019-10172" }, { "cve": "CVE-2019-13990", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2019-13990" }, { "cve": "CVE-2021-23369", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2021-23369" }, { "cve": "CVE-2022-1471", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2022-1471" }, { "cve": "CVE-2022-24329", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2022-24329" }, { "cve": "CVE-2022-25147", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2022-25147" }, { "cve": "CVE-2022-34169", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2022-34169" }, { "cve": "CVE-2022-34381", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2022-34381" }, { "cve": "CVE-2022-42003", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2022-42003" }, { "cve": "CVE-2022-45378", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2022-45378" }, { "cve": "CVE-2022-46337", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2022-46337" }, { "cve": "CVE-2022-48579", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2022-48579" }, { "cve": "CVE-2023-24021", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2023-24021" }, { "cve": "CVE-2023-2976", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2023-2976" }, { "cve": "CVE-2023-31122", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2023-31122" }, { "cve": "CVE-2023-33201", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2023-33201" }, { "cve": "CVE-2023-35116", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2023-35116" }, { "cve": "CVE-2023-35887", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2023-35887" }, { "cve": "CVE-2023-3635", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2023-3635" }, { "cve": "CVE-2023-37536", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2023-37536" }, { "cve": "CVE-2023-44487", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2023-44487" }, { "cve": "CVE-2023-46218", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2023-46218" }, { "cve": "CVE-2023-46589", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2023-46589" }, { "cve": "CVE-2023-48795", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2023-48795" }, { "cve": "CVE-2023-5072", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2023-5072" }, { "cve": "CVE-2023-52428", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2023-52428" }, { "cve": "CVE-2024-1597", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2024-1597" }, { "cve": "CVE-2024-20991", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2024-20991" }, { "cve": "CVE-2024-20992", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2024-20992" }, { "cve": "CVE-2024-21006", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2024-21006" }, { "cve": "CVE-2024-21007", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2024-21007" }, { "cve": "CVE-2024-21117", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2024-21117" }, { "cve": "CVE-2024-21118", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2024-21118" }, { "cve": "CVE-2024-21119", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2024-21119" }, { "cve": "CVE-2024-21120", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2024-21120" }, { "cve": "CVE-2024-23635", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2024-23635" }, { "cve": "CVE-2024-26308", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T024993", "618028", "751674", "T034057", "829576" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2024-26308" } ] }
WID-SEC-W-2023-0122
Vulnerability from csaf_certbund
Published
2023-01-17 23:00
Modified
2023-01-17 23:00
Summary
Oracle Supply Chain: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Die Oracle Supply Chain ist eine Sammlung von Applikationen für verschiedene Zwecke.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Oracle Supply Chain ausnutzen, um die Vertraulichkeit, Integrität und Verfügbarkeit zu gefährden.
Betroffene Betriebssysteme
- UNIX
- Linux
- Windows
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Die Oracle Supply Chain ist eine Sammlung von Applikationen f\u00fcr verschiedene Zwecke.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Oracle Supply Chain ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-0122 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-0122.json" }, { "category": "self", "summary": "WID-SEC-2023-0122 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0122" }, { "category": "external", "summary": "Oracle Critical Patch Update Advisory - January 2023 - Appendix Oracle Supply Chain vom 2023-01-17", "url": "https://www.oracle.com/security-alerts/cpujan2023.html#AppendixSCP" } ], "source_lang": "en-US", "title": "Oracle Supply Chain: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-01-17T23:00:00.000+00:00", "generator": { "date": "2024-02-15T17:10:15.790+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-0122", "initial_release_date": "2023-01-17T23:00:00.000+00:00", "revision_history": [ { "date": "2023-01-17T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Oracle Supply Chain 9.3.6", "product": { "name": "Oracle Supply Chain 9.3.6", "product_id": "T019052", "product_identification_helper": { "cpe": "cpe:/a:oracle:supply_chain:9.3.6" } } }, { "category": "product_name", "name": "Oracle Supply Chain 12.1", "product": { "name": "Oracle Supply Chain 12.1", "product_id": "T019054", "product_identification_helper": { "cpe": "cpe:/a:oracle:supply_chain:12.1" } } }, { "category": "product_name", "name": "Oracle Supply Chain 12.2", "product": { "name": "Oracle Supply Chain 12.2", "product_id": "T019055", "product_identification_helper": { "cpe": "cpe:/a:oracle:supply_chain:12.2" } } }, { "category": "product_name", "name": "Oracle Supply Chain 12.2.11", "product": { "name": "Oracle Supply Chain 12.2.11", "product_id": "T021721", "product_identification_helper": { "cpe": "cpe:/a:oracle:supply_chain:12.2.11" } } }, { "category": "product_name", "name": "Oracle Supply Chain \u003c 21.0.2.6", "product": { "name": "Oracle Supply Chain \u003c 21.0.2.6", "product_id": "T025892", "product_identification_helper": { "cpe": "cpe:/a:oracle:supply_chain:21.0.2.6" } } }, { "category": "product_name", "name": "Oracle Supply Chain 12.2.7", "product": { "name": "Oracle Supply Chain 12.2.7", "product_id": "T025893", "product_identification_helper": { "cpe": "cpe:/a:oracle:supply_chain:12.2.7" } } }, { "category": "product_name", "name": "Oracle Supply Chain 12.2.8", "product": { "name": "Oracle Supply Chain 12.2.8", "product_id": "T025894", "product_identification_helper": { "cpe": "cpe:/a:oracle:supply_chain:12.2.8" } } }, { "category": "product_name", "name": "Oracle Supply Chain 12.2.9", "product": { "name": "Oracle Supply Chain 12.2.9", "product_id": "T025895", "product_identification_helper": { "cpe": "cpe:/a:oracle:supply_chain:12.2.9" } } }, { "category": "product_name", "name": "Oracle Supply Chain 12.2.10", "product": { "name": "Oracle Supply Chain 12.2.10", "product_id": "T025896", "product_identification_helper": { "cpe": "cpe:/a:oracle:supply_chain:12.2.10" } } }, { "category": "product_name", "name": "Oracle Supply Chain 12.2.12", "product": { "name": "Oracle Supply Chain 12.2.12", "product_id": "T025897", "product_identification_helper": { "cpe": "cpe:/a:oracle:supply_chain:12.2.12" } } }, { "category": "product_name", "name": "Oracle Supply Chain \u003c 21.0.2.0", "product": { "name": "Oracle Supply Chain \u003c 21.0.2.0", "product_id": "T025898", "product_identification_helper": { "cpe": "cpe:/a:oracle:supply_chain:21.0.2.0" } } } ], "category": "product_name", "name": "Supply Chain" } ], "category": "vendor", "name": "Oracle" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-21850", "notes": [ { "category": "description", "text": "In Oracle Supply Chain existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T021721", "T019052", "T025895", "T025894", "T019054", "T025897", "T025896", "T019055", "T025893" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2023-21850" }, { "cve": "CVE-2022-42252", "notes": [ { "category": "description", "text": "In Oracle Supply Chain existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T021721", "T019052", "T025895", "T025894", "T019054", "T025897", "T025896", "T019055", "T025893" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-42252" }, { "cve": "CVE-2022-34169", "notes": [ { "category": "description", "text": "In Oracle Supply Chain existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T021721", "T019052", "T025895", "T025894", "T019054", "T025897", "T025896", "T019055", "T025893" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-34169" }, { "cve": "CVE-2022-24839", "notes": [ { "category": "description", "text": "In Oracle Supply Chain existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T021721", "T019052", "T025895", "T025894", "T019054", "T025897", "T025896", "T019055", "T025893" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2022-24839" }, { "cve": "CVE-2021-44832", "notes": [ { "category": "description", "text": "In Oracle Supply Chain existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T021721", "T019052", "T025895", "T025894", "T019054", "T025897", "T025896", "T019055", "T025893" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2021-44832" }, { "cve": "CVE-2020-27844", "notes": [ { "category": "description", "text": "In Oracle Supply Chain existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T021721", "T019052", "T025895", "T025894", "T019054", "T025897", "T025896", "T019055", "T025893" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2020-27844" }, { "cve": "CVE-2019-7317", "notes": [ { "category": "description", "text": "In Oracle Supply Chain existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T021721", "T019052", "T025895", "T025894", "T019054", "T025897", "T025896", "T019055", "T025893" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2019-7317" }, { "cve": "CVE-2019-12415", "notes": [ { "category": "description", "text": "In Oracle Supply Chain existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T021721", "T019052", "T025895", "T025894", "T019054", "T025897", "T025896", "T019055", "T025893" ] }, "release_date": "2023-01-17T23:00:00Z", "title": "CVE-2019-12415" } ] }
WID-SEC-W-2024-0671
Vulnerability from csaf_certbund
Published
2024-03-19 23:00
Modified
2024-03-20 23:00
Summary
Atlassian Jira Software: Mehrere Schwachstellen ermöglichen Codeausführung und DoS
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Jira ist eine Webanwendung zur Softwareentwicklung.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in der Atlassian Jira Software ausnutzen, um beliebigen Code auszuführen oder einen Denial-of-Service-Zustand zu verursachen.
Betroffene Betriebssysteme
- Linux
- MacOS X
- Windows
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Jira ist eine Webanwendung zur Softwareentwicklung.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in der Atlassian Jira Software ausnutzen, um beliebigen Code auszuf\u00fchren oder einen Denial-of-Service-Zustand zu verursachen.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- MacOS X\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0671 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0671.json" }, { "category": "self", "summary": "WID-SEC-2024-0671 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0671" }, { "category": "external", "summary": "Atlassian Security Advisory vom 2024-03-19", "url": "https://confluence.atlassian.com/security/security-bulletin-march-19-2024-1369444862.html" } ], "source_lang": "en-US", "title": "Atlassian Jira Software: Mehrere Schwachstellen erm\u00f6glichen Codeausf\u00fchrung und DoS", "tracking": { "current_release_date": "2024-03-20T23:00:00.000+00:00", "generator": { "date": "2024-03-21T10:35:53.821+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2024-0671", "initial_release_date": "2024-03-19T23:00:00.000+00:00", "revision_history": [ { "date": "2024-03-19T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-03-20T23:00:00.000+00:00", "number": "2", "summary": "CVSS korrigiert" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "Data Center and Server \u003c 9.14.1", "product": { "name": "Atlassian Jira Software Data Center and Server \u003c 9.14.1", "product_id": "T033559", "product_identification_helper": { "cpe": "cpe:/a:atlassian:jira_software:data_center_and_server__9.14.1" } } }, { "category": "product_version_range", "name": "Data Center \u003c 9.14.0", "product": { "name": "Atlassian Jira Software Data Center \u003c 9.14.0", "product_id": "T033561", "product_identification_helper": { "cpe": "cpe:/a:atlassian:jira_software:data_center__9.14.0" } } }, { "category": "product_version_range", "name": "Data Center and Server \u003c 9.13.1", "product": { "name": "Atlassian Jira Software Data Center and Server \u003c 9.13.1", "product_id": "T033563", "product_identification_helper": { "cpe": "cpe:/a:atlassian:jira_software:data_center_and_server__9.13.1" } } }, { "category": "product_version_range", "name": "Data Center and Server \u003c 9.12.5", "product": { "name": "Atlassian Jira Software Data Center and Server \u003c 9.12.5", "product_id": "T033564", "product_identification_helper": { "cpe": "cpe:/a:atlassian:jira_software:data_center_and_server__9.12.5" } } }, { "category": "product_version_range", "name": "Data Center and Server \u003c 9.4.18", "product": { "name": "Atlassian Jira Software Data Center and Server \u003c 9.4.18", "product_id": "T033566", "product_identification_helper": { "cpe": "cpe:/a:atlassian:jira_software:data_center_and_server__9.4.18" } } } ], "category": "product_name", "name": "Jira Software" } ], "category": "vendor", "name": "Atlassian" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-5072", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in der Atlassian Jira Software. Diese Fehler bestehen in den Komponenten Data Center und Server und basieren auf Problemen mehrerer Dritthersteller. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-03-19T23:00:00Z", "title": "CVE-2023-5072" }, { "cve": "CVE-2023-43642", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in der Atlassian Jira Software. Diese Fehler bestehen in den Komponenten Data Center und Server und basieren auf Problemen mehrerer Dritthersteller. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-03-19T23:00:00Z", "title": "CVE-2023-43642" }, { "cve": "CVE-2023-39410", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in der Atlassian Jira Software. Diese Fehler bestehen in den Komponenten Data Center und Server und basieren auf Problemen mehrerer Dritthersteller. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-03-19T23:00:00Z", "title": "CVE-2023-39410" }, { "cve": "CVE-2023-34455", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in der Atlassian Jira Software. Diese Fehler bestehen in den Komponenten Data Center und Server und basieren auf Problemen mehrerer Dritthersteller. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-03-19T23:00:00Z", "title": "CVE-2023-34455" }, { "cve": "CVE-2023-34454", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in der Atlassian Jira Software. Diese Fehler bestehen in den Komponenten Data Center und Server und basieren auf Problemen mehrerer Dritthersteller. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-03-19T23:00:00Z", "title": "CVE-2023-34454" }, { "cve": "CVE-2023-34453", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in der Atlassian Jira Software. Diese Fehler bestehen in den Komponenten Data Center und Server und basieren auf Problemen mehrerer Dritthersteller. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-03-19T23:00:00Z", "title": "CVE-2023-34453" }, { "cve": "CVE-2023-1436", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in der Atlassian Jira Software. Diese Fehler bestehen in den Komponenten Data Center und Server und basieren auf Problemen mehrerer Dritthersteller. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-03-19T23:00:00Z", "title": "CVE-2023-1436" }, { "cve": "CVE-2022-45688", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in der Atlassian Jira Software. Diese Fehler bestehen in den Komponenten Data Center und Server und basieren auf Problemen mehrerer Dritthersteller. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-03-19T23:00:00Z", "title": "CVE-2022-45688" }, { "cve": "CVE-2022-45685", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in der Atlassian Jira Software. Diese Fehler bestehen in den Komponenten Data Center und Server und basieren auf Problemen mehrerer Dritthersteller. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-03-19T23:00:00Z", "title": "CVE-2022-45685" }, { "cve": "CVE-2022-42890", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in der Atlassian Jira Software. Diese Fehler bestehen in den Komponenten Data Center und Server und basieren auf Problemen mehrerer Dritthersteller. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-03-19T23:00:00Z", "title": "CVE-2022-42890" }, { "cve": "CVE-2022-41704", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in der Atlassian Jira Software. Diese Fehler bestehen in den Komponenten Data Center und Server und basieren auf Problemen mehrerer Dritthersteller. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-03-19T23:00:00Z", "title": "CVE-2022-41704" }, { "cve": "CVE-2022-40150", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in der Atlassian Jira Software. Diese Fehler bestehen in den Komponenten Data Center und Server und basieren auf Problemen mehrerer Dritthersteller. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-03-19T23:00:00Z", "title": "CVE-2022-40150" }, { "cve": "CVE-2022-40149", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in der Atlassian Jira Software. Diese Fehler bestehen in den Komponenten Data Center und Server und basieren auf Problemen mehrerer Dritthersteller. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-03-19T23:00:00Z", "title": "CVE-2022-40149" }, { "cve": "CVE-2022-40146", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in der Atlassian Jira Software. Diese Fehler bestehen in den Komponenten Data Center und Server und basieren auf Problemen mehrerer Dritthersteller. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-03-19T23:00:00Z", "title": "CVE-2022-40146" }, { "cve": "CVE-2022-3509", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in der Atlassian Jira Software. Diese Fehler bestehen in den Komponenten Data Center und Server und basieren auf Problemen mehrerer Dritthersteller. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-03-19T23:00:00Z", "title": "CVE-2022-3509" }, { "cve": "CVE-2022-34169", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in der Atlassian Jira Software. Diese Fehler bestehen in den Komponenten Data Center und Server und basieren auf Problemen mehrerer Dritthersteller. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-03-19T23:00:00Z", "title": "CVE-2022-34169" }, { "cve": "CVE-2022-3171", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in der Atlassian Jira Software. Diese Fehler bestehen in den Komponenten Data Center und Server und basieren auf Problemen mehrerer Dritthersteller. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-03-19T23:00:00Z", "title": "CVE-2022-3171" }, { "cve": "CVE-2022-29546", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in der Atlassian Jira Software. Diese Fehler bestehen in den Komponenten Data Center und Server und basieren auf Problemen mehrerer Dritthersteller. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-03-19T23:00:00Z", "title": "CVE-2022-29546" }, { "cve": "CVE-2022-28366", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in der Atlassian Jira Software. Diese Fehler bestehen in den Komponenten Data Center und Server und basieren auf Problemen mehrerer Dritthersteller. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-03-19T23:00:00Z", "title": "CVE-2022-28366" }, { "cve": "CVE-2022-24839", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in der Atlassian Jira Software. Diese Fehler bestehen in den Komponenten Data Center und Server und basieren auf Problemen mehrerer Dritthersteller. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren oder einen Denial-of-Service-Zustand zu verursachen." } ], "release_date": "2024-03-19T23:00:00Z", "title": "CVE-2022-24839" } ] }
WID-SEC-W-2024-0890
Vulnerability from csaf_certbund
Published
2024-04-16 22:00
Modified
2024-04-16 22:00
Summary
Oracle Supply Chain: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Die Oracle Supply Chain ist eine Sammlung von Applikationen für verschiedene Zwecke.
Angriff
Ein Angreifer kann mehrere Schwachstellen in Oracle Supply Chain ausnutzen, um die Vertraulichkeit, Integrität und Verfügbarkeit zu gefährden.
Betroffene Betriebssysteme
- Linux
- UNIX
- Windows
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Die Oracle Supply Chain ist eine Sammlung von Applikationen f\u00fcr verschiedene Zwecke.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Oracle Supply Chain ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0890 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0890.json" }, { "category": "self", "summary": "WID-SEC-2024-0890 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0890" }, { "category": "external", "summary": "Oracle Critical Patch Update Advisory - April 2024 - Appendix Oracle Supply Chain vom 2024-04-16", "url": "https://www.oracle.com/security-alerts/cpuapr2024.html#AppendixSCP" } ], "source_lang": "en-US", "title": "Oracle Supply Chain: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-04-16T22:00:00.000+00:00", "generator": { "date": "2024-04-17T10:37:15.400+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2024-0890", "initial_release_date": "2024-04-16T22:00:00.000+00:00", "revision_history": [ { "date": "2024-04-16T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "9.3.6", "product": { "name": "Oracle Supply Chain 9.3.6", "product_id": "T019052", "product_identification_helper": { "cpe": "cpe:/a:oracle:supply_chain:9.3.6" } } }, { "category": "product_version", "name": "6.2.4.2", "product": { "name": "Oracle Supply Chain 6.2.4.2", "product_id": "T032129", "product_identification_helper": { "cpe": "cpe:/a:oracle:supply_chain:6.2.4.2" } } }, { "category": "product_version", "name": "6.5.2", "product": { "name": "Oracle Supply Chain 6.5.2", "product_id": "T034190", "product_identification_helper": { "cpe": "cpe:/a:oracle:supply_chain:6.5.2" } } }, { "category": "product_version", "name": "6.5.3", "product": { "name": "Oracle Supply Chain 6.5.3", "product_id": "T034191", "product_identification_helper": { "cpe": "cpe:/a:oracle:supply_chain:6.5.3" } } } ], "category": "product_name", "name": "Supply Chain" } ], "category": "vendor", "name": "Oracle" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-34169", "notes": [ { "category": "description", "text": "In Oracle Supply Chain existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL-HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T034190", "T032129", "T034191", "T019052" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2022-34169" }, { "cve": "CVE-2023-24998", "notes": [ { "category": "description", "text": "In Oracle Supply Chain existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL-HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T034190", "T032129", "T034191", "T019052" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2023-24998" }, { "cve": "CVE-2023-42503", "notes": [ { "category": "description", "text": "In Oracle Supply Chain existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL-HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T034190", "T032129", "T034191", "T019052" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2023-42503" }, { "cve": "CVE-2023-46589", "notes": [ { "category": "description", "text": "In Oracle Supply Chain existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL-HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T034190", "T032129", "T034191", "T019052" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2023-46589" }, { "cve": "CVE-2024-21091", "notes": [ { "category": "description", "text": "In Oracle Supply Chain existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL-HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T034190", "T032129", "T034191", "T019052" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2024-21091" }, { "cve": "CVE-2024-21092", "notes": [ { "category": "description", "text": "In Oracle Supply Chain existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL-HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T034190", "T032129", "T034191", "T019052" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2024-21092" } ] }
WID-SEC-W-2023-1017
Vulnerability from csaf_certbund
Published
2023-04-18 22:00
Modified
2023-04-18 22:00
Summary
Oracle Financial Services Applications: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Oracle Financial Services ist eine Zusammenstellung von Anwendungen für den Finanzsektor und eine Technologiebasis zur Erfüllung von IT- und Geschäftsanforderungen.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Oracle Financial Services Applications ausnutzen, um die Vertraulichkeit, Integrität und Verfügbarkeit zu gefährden.
Betroffene Betriebssysteme
- UNIX
- Linux
- Windows
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Oracle Financial Services ist eine Zusammenstellung von Anwendungen f\u00fcr den Finanzsektor und eine Technologiebasis zur Erf\u00fcllung von IT- und Gesch\u00e4ftsanforderungen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Oracle Financial Services Applications ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-1017 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1017.json" }, { "category": "self", "summary": "WID-SEC-2023-1017 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1017" }, { "category": "external", "summary": "Oracle Critical Patch Update Advisory - April 2023 - Appendix Oracle Financial Services Applications vom 2023-04-18", "url": "https://www.oracle.com/security-alerts/cpuapr2023.html#AppendixIFLX" } ], "source_lang": "en-US", "title": "Oracle Financial Services Applications: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-04-18T22:00:00.000+00:00", "generator": { "date": "2024-02-15T17:24:35.044+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-1017", "initial_release_date": "2023-04-18T22:00:00.000+00:00", "revision_history": [ { "date": "2023-04-18T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Oracle Financial Services Applications 2.7.1", "product": { "name": "Oracle Financial Services Applications 2.7.1", "product_id": "T018979", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:2.7.1" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 11.7", "product": { "name": "Oracle Financial Services Applications 11.7", "product_id": "T020695", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:11.7" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 11.8", "product": { "name": "Oracle Financial Services Applications 11.8", "product_id": "T020696", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:11.8" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 11.10", "product": { "name": "Oracle Financial Services Applications 11.10", "product_id": "T020698", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:11.10" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 18.3", "product": { "name": "Oracle Financial Services Applications 18.3", "product_id": "T021669", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:18.3" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 19.1", "product": { "name": "Oracle Financial Services Applications 19.1", "product_id": "T021670", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:19.1" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 19.2", "product": { "name": "Oracle Financial Services Applications 19.2", "product_id": "T021671", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:19.2" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 21.1", "product": { "name": "Oracle Financial Services Applications 21.1", "product_id": "T021673", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:21.1" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.1.1.0", "product": { "name": "Oracle Financial Services Applications 8.1.1.0", "product_id": "T022833", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.1.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.1.2.0", "product": { "name": "Oracle Financial Services Applications 8.1.2.0", "product_id": "T022834", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.2.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.1.1.1", "product": { "name": "Oracle Financial Services Applications 8.1.1.1", "product_id": "T022835", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.1.1" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.0.9.0", "product": { "name": "Oracle Financial Services Applications 8.0.9.0", "product_id": "T022840", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.0.9.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.0.8.0", "product": { "name": "Oracle Financial Services Applications 8.0.8.0", "product_id": "T022841", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.0.8.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.0.8.1", "product": { "name": "Oracle Financial Services Applications 8.0.8.1", "product_id": "T022844", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.0.8.1" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.1.0.0", "product": { "name": "Oracle Financial Services Applications 8.1.0.0", "product_id": "T023923", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.0.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.1.2.1", "product": { "name": "Oracle Financial Services Applications 8.1.2.1", "product_id": "T023924", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.2.1" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.0.7.0", "product": { "name": "Oracle Financial Services Applications 8.0.7.0", "product_id": "T023925", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.0.7.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 2.7", "product": { "name": "Oracle Financial Services Applications 2.7", "product_id": "T023927", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:2.7" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 2.9", "product": { "name": "Oracle Financial Services Applications 2.9", "product_id": "T023928", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:2.9" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.1.2.2", "product": { "name": "Oracle Financial Services Applications 8.1.2.2", "product_id": "T024988", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.2.2" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.0.8.2", "product": { "name": "Oracle Financial Services Applications 8.0.8.2", "product_id": "T024990", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.0.8.2" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.0.8.3.1", "product": { "name": "Oracle Financial Services Applications 8.0.8.3.1", "product_id": "T025878", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.0.8.3.1" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications \u003c= 14.7", "product": { "name": "Oracle Financial Services Applications \u003c= 14.7", "product_id": "T027348", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:14.7" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 22.1", "product": { "name": "Oracle Financial Services Applications 22.1", "product_id": "T027349", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:22.1" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 22.2", "product": { "name": "Oracle Financial Services Applications 22.2", "product_id": "T027350", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:22.2" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.1.2.4", "product": { "name": "Oracle Financial Services Applications 8.1.2.4", "product_id": "T027351", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.2.4" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.1.2.3", "product": { "name": "Oracle Financial Services Applications 8.1.2.3", "product_id": "T027352", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.2.3" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 2.8", "product": { "name": "Oracle Financial Services Applications 2.8", "product_id": "T027353", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:2.8" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 18.2", "product": { "name": "Oracle Financial Services Applications 18.2", "product_id": "T027354", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:18.2" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.1.2.4.1", "product": { "name": "Oracle Financial Services Applications 8.1.2.4.1", "product_id": "T027358", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.2.4.1" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 2.9.1", "product": { "name": "Oracle Financial Services Applications 2.9.1", "product_id": "T027359", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:2.9.1" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 3.0", "product": { "name": "Oracle Financial Services Applications 3.0", "product_id": "T027360", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:3.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 3.1", "product": { "name": "Oracle Financial Services Applications 3.1", "product_id": "T027361", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:3.1" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 3.2", "product": { "name": "Oracle Financial Services Applications 3.2", "product_id": "T027362", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:3.2" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 4.0", "product": { "name": "Oracle Financial Services Applications 4.0", "product_id": "T027363", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:4.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.0.8.0.0", "product": { "name": "Oracle Financial Services Applications 8.0.8.0.0", "product_id": "T027364", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.0.8.0.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 11.6", "product": { "name": "Oracle Financial Services Applications 11.6", "product_id": "T027365", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:11.6" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 11.11", "product": { "name": "Oracle Financial Services Applications 11.11", "product_id": "T027366", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:11.11" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.0.7.1.2", "product": { "name": "Oracle Financial Services Applications 8.0.7.1.2", "product_id": "T027367", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.0.7.1.2" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.1.1.1.7", "product": { "name": "Oracle Financial Services Applications 8.1.1.1.7", "product_id": "T027368", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.1.1.7" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.0.7.8.0", "product": { "name": "Oracle Financial Services Applications 8.0.7.8.0", "product_id": "T027369", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.0.7.8.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.1.1.1.1", "product": { "name": "Oracle Financial Services Applications 8.1.1.1.1", "product_id": "T027370", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.1.1.1" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.0.8.1.4", "product": { "name": "Oracle Financial Services Applications 8.0.8.1.4", "product_id": "T027371", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.0.8.1.4" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.1.0.1.4", "product": { "name": "Oracle Financial Services Applications 8.1.0.1.4", "product_id": "T027372", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.0.1.4" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.1.2.2.1", "product": { "name": "Oracle Financial Services Applications 8.1.2.2.1", "product_id": "T027373", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.2.2.1" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.0.7.3.1", "product": { "name": "Oracle Financial Services Applications 8.0.7.3.1", "product_id": "T027374", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.0.7.3.1" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.0.7.8.1", "product": { "name": "Oracle Financial Services Applications 8.0.7.8.1", "product_id": "T027375", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.0.7.8.1" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.0.8.2.1", "product": { "name": "Oracle Financial Services Applications 8.0.8.2.1", "product_id": "T027376", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.0.8.2.1" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.1.1.2.0", "product": { "name": "Oracle Financial Services Applications 8.1.1.2.0", "product_id": "T027377", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.1.2.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.0.8.3.5", "product": { "name": "Oracle Financial Services Applications 8.0.8.3.5", "product_id": "T027378", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.0.8.3.5" } } } ], "category": "product_name", "name": "Financial Services Applications" } ], "category": "vendor", "name": "Oracle" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-28708", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2023-28708" }, { "cve": "CVE-2023-25194", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2023-25194" }, { "cve": "CVE-2023-24998", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2023-24998" }, { "cve": "CVE-2023-21915", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2023-21915" }, { "cve": "CVE-2023-21908", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2023-21908" }, { "cve": "CVE-2023-21907", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2023-21907" }, { "cve": "CVE-2023-21906", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2023-21906" }, { "cve": "CVE-2023-21905", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2023-21905" }, { "cve": "CVE-2023-21904", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2023-21904" }, { "cve": "CVE-2023-21903", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2023-21903" }, { "cve": "CVE-2023-21902", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2023-21902" }, { "cve": "CVE-2022-46908", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-46908" }, { "cve": "CVE-2022-46364", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-46364" }, { "cve": "CVE-2022-43680", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-43680" }, { "cve": "CVE-2022-42890", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-42890" }, { "cve": "CVE-2022-42889", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-42889" }, { "cve": "CVE-2022-42252", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-42252" }, { "cve": "CVE-2022-42003", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-42003" }, { "cve": "CVE-2022-41881", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-41881" }, { "cve": "CVE-2022-40146", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-40146" }, { "cve": "CVE-2022-38752", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-38752" }, { "cve": "CVE-2022-36033", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-36033" }, { "cve": "CVE-2022-34169", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-34169" }, { "cve": "CVE-2022-3171", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-3171" }, { "cve": "CVE-2022-29577", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-29577" }, { "cve": "CVE-2022-25647", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-25647" }, { "cve": "CVE-2022-24839", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-24839" }, { "cve": "CVE-2022-23437", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-23437" }, { "cve": "CVE-2022-22979", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-22979" }, { "cve": "CVE-2022-22978", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-22978" }, { "cve": "CVE-2022-22971", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-22971" }, { "cve": "CVE-2022-2048", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-2048" }, { "cve": "CVE-2021-43859", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2021-43859" }, { "cve": "CVE-2021-41184", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2021-41184" }, { "cve": "CVE-2021-36090", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2021-36090" }, { "cve": "CVE-2021-29425", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2021-29425" }, { "cve": "CVE-2020-11988", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2020-11988" }, { "cve": "CVE-2019-12415", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T027351", "T027352", "T027350", "T027359", "T027358", "T027353", "T027354", "T027362", "T027363", "T027360", "T027361", "T020698", "T022833", "T022834", "T023923", "T020696", "T022835", "T023924", "T020695", "T023925", "T021669", "T018979", "T027368", "T027369", "T027366", "T027367", "T027364", "T027365", "T027373", "T027374", "T027371", "T027372", "T027370", "T023927", "T023928", "T022844", "T022840", "T022841", "T024988", "T025878", "T021673", "T027377", "T027378", "T021671", "T027375", "T021670", "T027376", "T027349", "T024990" ], "last_affected": [ "T027348" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2019-12415" } ] }
wid-sec-w-2023-2368
Vulnerability from csaf_certbund
Published
2023-09-14 22:00
Modified
2024-01-07 23:00
Summary
IBM Operational Decision Manager: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
IBM Operational Decision Manager ist Software für die Integration von Geschäftsereignissen und Geschäftsregeln, um Entscheidungen über verschiedene Prozesse und Anwendungen hinweg zu automatisieren.
Angriff
Ein entfernter authentifizierter Angreifer kann mehrere Schwachstellen in IBM Operational Decision Manager ausnutzen, um Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen oder vertrauliche Informationen offenzulegen.
Betroffene Betriebssysteme
- Linux
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "IBM Operational Decision Manager ist Software f\u00fcr die Integration von Gesch\u00e4ftsereignissen und Gesch\u00e4ftsregeln, um Entscheidungen \u00fcber verschiedene Prozesse und Anwendungen hinweg zu automatisieren.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter authentifizierter Angreifer kann mehrere Schwachstellen in IBM Operational Decision Manager ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen oder vertrauliche Informationen offenzulegen.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-2368 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-2368.json" }, { "category": "self", "summary": "WID-SEC-2023-2368 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2368" }, { "category": "external", "summary": "IBM Security Bulletin - 7032928 vom 2023-09-14", "url": "https://www.ibm.com/support/pages/node/7032928" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:6138 vom 2023-10-26", "url": "https://access.redhat.com/errata/RHSA-2023:6138" }, { "category": "external", "summary": "IBM Security Bulletin 7105614 vom 2024-01-08", "url": "https://www.ibm.com/support/pages/node/7105614" } ], "source_lang": "en-US", "title": "IBM Operational Decision Manager: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-01-07T23:00:00.000+00:00", "generator": { "date": "2024-02-15T17:44:18.727+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-2368", "initial_release_date": "2023-09-14T22:00:00.000+00:00", "revision_history": [ { "date": "2023-09-14T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-10-26T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-01-07T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von IBM aufgenommen" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "IBM Operational Decision Manager \u003c 8.10.5.1", "product": { "name": "IBM Operational Decision Manager \u003c 8.10.5.1", "product_id": "T029909", "product_identification_helper": { "cpe": "cpe:/a:ibm:operational_decision_manager:8.10.5.1" } } }, { "category": "product_name", "name": "IBM Operational Decision Manager \u003c 8.11.0.1", "product": { "name": "IBM Operational Decision Manager \u003c 8.11.0.1", "product_id": "T029910", "product_identification_helper": { "cpe": "cpe:/a:ibm:operational_decision_manager:8.11.0.1" } } }, { "category": "product_name", "name": "IBM Operational Decision Manager \u003c 8.11.1", "product": { "name": "IBM Operational Decision Manager \u003c 8.11.1", "product_id": "T029911", "product_identification_helper": { "cpe": "cpe:/a:ibm:operational_decision_manager:8.11.1" } } }, { "category": "product_name", "name": "IBM Operational Decision Manager \u003c 8.12.0", "product": { "name": "IBM Operational Decision Manager \u003c 8.12.0", "product_id": "T029912", "product_identification_helper": { "cpe": "cpe:/a:ibm:operational_decision_manager:8.12.0" } } }, { "category": "product_name", "name": "IBM Operational Decision Manager 8.10.5.1 \u003c IF049", "product": { "name": "IBM Operational Decision Manager 8.10.5.1 \u003c IF049", "product_id": "T031894", "product_identification_helper": { "cpe": "cpe:/a:ibm:operational_decision_manager:8.10.5.1__if049" } } } ], "category": "product_name", "name": "Operational Decision Manager" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-2047", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in IBM Operational Decision Manager. Dieser Fehler besteht in der HttpURI-Klasse der Eclipse Jetty-Komponente. Durch das Senden einer speziell gestalteten Anfrage kann ein Angreifer diese Schwachstelle ausnutzen, um die Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "T031894", "67646" ] }, "release_date": "2023-09-14T22:00:00Z", "title": "CVE-2022-2047" }, { "cve": "CVE-2014-0107", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in IBM Operational Decision Manager. Dieser Fehler besteht in der Apache Xalan-Java-Komponente aufgrund einer unsachgem\u00e4\u00dfen Behandlung von Ausgabeeigenschaften. Ein entfernter Angreifer kann diese Schwachstelle zur Umgehung von Sicherheitsma\u00dfnahmen ausnutzen." } ], "product_status": { "known_affected": [ "T031894", "67646" ] }, "release_date": "2023-09-14T22:00:00Z", "title": "CVE-2014-0107" }, { "cve": "CVE-2022-25881", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in IBM Operational Decision Manager. Dieser Fehler besteht im Node.js http-cache-semantics-Modul aufgrund eines Denial of Service (ReDoS) durch regul\u00e4re Ausdr\u00fccke. Durch das Senden einer speziell gestalteten Regex-Eingabe unter Verwendung von Request-Header-Werten kann ein entfernter Angreifer diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu verursachen." } ], "product_status": { "known_affected": [ "T031894", "67646" ] }, "release_date": "2023-09-14T22:00:00Z", "title": "CVE-2022-25881" }, { "cve": "CVE-2022-34169", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in IBM Operational Decision Manager. Dieser Fehler besteht in der Apache Xalan Java XSLT Bibliothekskomponente aufgrund eines Integer Truncation Problems bei der Verarbeitung von b\u00f6sartigen XSLT Stylesheets. Ein entfernter Angreifer kann diese Schwachstelle zur Ausf\u00fchrung von beliebigem Code ausnutzen" } ], "product_status": { "known_affected": [ "T031894", "67646" ] }, "release_date": "2023-09-14T22:00:00Z", "title": "CVE-2022-34169" }, { "cve": "CVE-2022-41946", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in IBM Operational Decision Manager. Dieser Fehler besteht in der Postgresql JDBC-Komponente aufgrund eines nicht eingeschr\u00e4nkten Zugriffs zum Erstellen lesbarer Dateien im TemporaryFolder. Durch das Senden einer speziell gestalteten Anfrage kann ein Angreifer diese Schwachstelle ausnutzen, um vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T031894", "67646" ] }, "release_date": "2023-09-14T22:00:00Z", "title": "CVE-2022-41946" }, { "cve": "CVE-2023-34034", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in IBM Operational Decision Manager. Dieser Fehler besteht in der Komponente VMware Tanzu Spring Security aufgrund einer unsachgem\u00e4\u00dfen Validierung von Benutzereingaben. Mit einer speziell gestalteten Konfiguration kann ein Angreifer diese Schwachstelle ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "T031894", "67646" ] }, "release_date": "2023-09-14T22:00:00Z", "title": "CVE-2023-34034" }, { "cve": "CVE-2023-37460", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in IBM Operational Decision Manager. Dieser Fehler besteht in der Komponente Plexus Archiver aufgrund der Verfolgung eines symbolischen Links in der Funktion resolveFile(). Durch Extrahieren einer speziell gestalteten Archivdatei, die einen symbolischen Link enth\u00e4lt, mit AbstractUnArchiver kann ein Angreifer diese Schwachstelle ausnutzen, um beliebigen Code auszuf\u00fchren." } ], "product_status": { "known_affected": [ "T031894", "67646" ] }, "release_date": "2023-09-14T22:00:00Z", "title": "CVE-2023-37460" } ] }
WID-SEC-W-2024-0124
Vulnerability from csaf_certbund
Published
2024-01-16 23:00
Modified
2024-01-16 23:00
Summary
Oracle Financial Services Applications: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Oracle Financial Services ist eine Zusammenstellung von Anwendungen für den Finanzsektor und eine Technologiebasis zur Erfüllung von IT- und Geschäftsanforderungen.
Angriff
Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Oracle Financial Services Applications ausnutzen, um die Vertraulichkeit, Integrität und Verfügbarkeit zu gefährden.
Betroffene Betriebssysteme
- UNIX
- Linux
- Windows
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Oracle Financial Services ist eine Zusammenstellung von Anwendungen f\u00fcr den Finanzsektor und eine Technologiebasis zur Erf\u00fcllung von IT- und Gesch\u00e4ftsanforderungen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Oracle Financial Services Applications ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0124 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0124.json" }, { "category": "self", "summary": "WID-SEC-2024-0124 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0124" }, { "category": "external", "summary": "Oracle Critical Patch Update Advisory - January 2024 - Appendix Oracle Financial Services Applications vom 2024-01-16", "url": "https://www.oracle.com/security-alerts/cpujan2024.html#AppendixIFLX" } ], "source_lang": "en-US", "title": "Oracle Financial Services Applications: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-01-16T23:00:00.000+00:00", "generator": { "date": "2024-02-15T17:56:56.463+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2024-0124", "initial_release_date": "2024-01-16T23:00:00.000+00:00", "revision_history": [ { "date": "2024-01-16T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Oracle Financial Services Applications 2.7.1", "product": { "name": "Oracle Financial Services Applications 2.7.1", "product_id": "T018979", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:2.7.1" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 2.8.0", "product": { "name": "Oracle Financial Services Applications 2.8.0", "product_id": "T018980", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:2.8.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 2.9.0", "product": { "name": "Oracle Financial Services Applications 2.9.0", "product_id": "T018981", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:2.9.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.1.0", "product": { "name": "Oracle Financial Services Applications 8.1.0", "product_id": "T018983", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.0.9", "product": { "name": "Oracle Financial Services Applications 8.0.9", "product_id": "T019890", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.0.9" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.1.1", "product": { "name": "Oracle Financial Services Applications 8.1.1", "product_id": "T019891", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.1" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.0.7", "product": { "name": "Oracle Financial Services Applications 8.0.7", "product_id": "T021676", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.0.7" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.0.8", "product": { "name": "Oracle Financial Services Applications 8.0.8", "product_id": "T021677", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.0.8" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.1.1.1", "product": { "name": "Oracle Financial Services Applications 8.1.1.1", "product_id": "T022835", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.1.1" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.0.8.1", "product": { "name": "Oracle Financial Services Applications 8.0.8.1", "product_id": "T022844", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.0.8.1" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.0.8.2", "product": { "name": "Oracle Financial Services Applications 8.0.8.2", "product_id": "T024990", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.0.8.2" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 2.9.1", "product": { "name": "Oracle Financial Services Applications 2.9.1", "product_id": "T027359", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:2.9.1" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.1.2", "product": { "name": "Oracle Financial Services Applications 8.1.2", "product_id": "T028705", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.2" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.1.2.5", "product": { "name": "Oracle Financial Services Applications 8.1.2.5", "product_id": "T028706", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.2.5" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications \u003c= 14.7.0", "product": { "name": "Oracle Financial Services Applications \u003c= 14.7.0", "product_id": "T028707", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:14.7.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 22.1.0", "product": { "name": "Oracle Financial Services Applications 22.1.0", "product_id": "T032101", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:22.1.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 22.2.0", "product": { "name": "Oracle Financial Services Applications 22.2.0", "product_id": "T032102", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:22.2.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 21.1.0", "product": { "name": "Oracle Financial Services Applications 21.1.0", "product_id": "T032103", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:21.1.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 8.1.2.6", "product": { "name": "Oracle Financial Services Applications 8.1.2.6", "product_id": "T032104", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:8.1.2.6" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 19.1.0", "product": { "name": "Oracle Financial Services Applications 19.1.0", "product_id": "T032105", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:19.1.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 5.0.0", "product": { "name": "Oracle Financial Services Applications 5.0.0", "product_id": "T032106", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:5.0.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 5.1.0", "product": { "name": "Oracle Financial Services Applications 5.1.0", "product_id": "T032107", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:5.1.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications \u003c= 3.2.0", "product": { "name": "Oracle Financial Services Applications \u003c= 3.2.0", "product_id": "T032108", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:3.2.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 4.0.0", "product": { "name": "Oracle Financial Services Applications 4.0.0", "product_id": "T032109", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:4.0.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 6.0.0", "product": { "name": "Oracle Financial Services Applications 6.0.0", "product_id": "T032110", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:6.0.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 14.7.0.3.0", "product": { "name": "Oracle Financial Services Applications 14.7.0.3.0", "product_id": "T032111", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:14.7.0.3.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 3.0.0", "product": { "name": "Oracle Financial Services Applications 3.0.0", "product_id": "T032112", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:3.0.0" } } }, { "category": "product_name", "name": "Oracle Financial Services Applications 3.1.0", "product": { "name": "Oracle Financial Services Applications 3.1.0", "product_id": "T032113", "product_identification_helper": { "cpe": "cpe:/a:oracle:financial_services_applications:3.1.0" } } } ], "category": "product_name", "name": "Financial Services Applications" } ], "category": "vendor", "name": "Oracle" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-5072", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T032104", "T032105", "T032102", "T032103", "T032109", "T032106", "T032107", "T019890", "T019891", "T032101", "T018980", "T018981", "T021677", "T022844", "T018983", "T021676", "T028705", "T028706", "T027359", "T032113", "T032111", "T032112", "T032110", "T022835", "T018979", "T024990" ], "last_affected": [ "T028707", "T032108" ] }, "release_date": "2024-01-16T23:00:00Z", "title": "CVE-2023-5072" }, { "cve": "CVE-2023-46604", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T032104", "T032105", "T032102", "T032103", "T032109", "T032106", "T032107", "T019890", "T019891", "T032101", "T018980", "T018981", "T021677", "T022844", "T018983", "T021676", "T028705", "T028706", "T027359", "T032113", "T032111", "T032112", "T032110", "T022835", "T018979", "T024990" ], "last_affected": [ "T028707", "T032108" ] }, "release_date": "2024-01-16T23:00:00Z", "title": "CVE-2023-46604" }, { "cve": "CVE-2023-44483", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T032104", "T032105", "T032102", "T032103", "T032109", "T032106", "T032107", "T019890", "T019891", "T032101", "T018980", "T018981", "T021677", "T022844", "T018983", "T021676", "T028705", "T028706", "T027359", "T032113", "T032111", "T032112", "T032110", "T022835", "T018979", "T024990" ], "last_affected": [ "T028707", "T032108" ] }, "release_date": "2024-01-16T23:00:00Z", "title": "CVE-2023-44483" }, { "cve": "CVE-2023-42503", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T032104", "T032105", "T032102", "T032103", "T032109", "T032106", "T032107", "T019890", "T019891", "T032101", "T018980", "T018981", "T021677", "T022844", "T018983", "T021676", "T028705", "T028706", "T027359", "T032113", "T032111", "T032112", "T032110", "T022835", "T018979", "T024990" ], "last_affected": [ "T028707", "T032108" ] }, "release_date": "2024-01-16T23:00:00Z", "title": "CVE-2023-42503" }, { "cve": "CVE-2023-34034", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T032104", "T032105", "T032102", "T032103", "T032109", "T032106", "T032107", "T019890", "T019891", "T032101", "T018980", "T018981", "T021677", "T022844", "T018983", "T021676", "T028705", "T028706", "T027359", "T032113", "T032111", "T032112", "T032110", "T022835", "T018979", "T024990" ], "last_affected": [ "T028707", "T032108" ] }, "release_date": "2024-01-16T23:00:00Z", "title": "CVE-2023-34034" }, { "cve": "CVE-2023-33201", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T032104", "T032105", "T032102", "T032103", "T032109", "T032106", "T032107", "T019890", "T019891", "T032101", "T018980", "T018981", "T021677", "T022844", "T018983", "T021676", "T028705", "T028706", "T027359", "T032113", "T032111", "T032112", "T032110", "T022835", "T018979", "T024990" ], "last_affected": [ "T028707", "T032108" ] }, "release_date": "2024-01-16T23:00:00Z", "title": "CVE-2023-33201" }, { "cve": "CVE-2023-2976", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T032104", "T032105", "T032102", "T032103", "T032109", "T032106", "T032107", "T019890", "T019891", "T032101", "T018980", "T018981", "T021677", "T022844", "T018983", "T021676", "T028705", "T028706", "T027359", "T032113", "T032111", "T032112", "T032110", "T022835", "T018979", "T024990" ], "last_affected": [ "T028707", "T032108" ] }, "release_date": "2024-01-16T23:00:00Z", "title": "CVE-2023-2976" }, { "cve": "CVE-2023-2618", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T032104", "T032105", "T032102", "T032103", "T032109", "T032106", "T032107", "T019890", "T019891", "T032101", "T018980", "T018981", "T021677", "T022844", "T018983", "T021676", "T028705", "T028706", "T027359", "T032113", "T032111", "T032112", "T032110", "T022835", "T018979", "T024990" ], "last_affected": [ "T028707", "T032108" ] }, "release_date": "2024-01-16T23:00:00Z", "title": "CVE-2023-2618" }, { "cve": "CVE-2023-24998", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T032104", "T032105", "T032102", "T032103", "T032109", "T032106", "T032107", "T019890", "T019891", "T032101", "T018980", "T018981", "T021677", "T022844", "T018983", "T021676", "T028705", "T028706", "T027359", "T032113", "T032111", "T032112", "T032110", "T022835", "T018979", "T024990" ], "last_affected": [ "T028707", "T032108" ] }, "release_date": "2024-01-16T23:00:00Z", "title": "CVE-2023-24998" }, { "cve": "CVE-2023-21901", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T032104", "T032105", "T032102", "T032103", "T032109", "T032106", "T032107", "T019890", "T019891", "T032101", "T018980", "T018981", "T021677", "T022844", "T018983", "T021676", "T028705", "T028706", "T027359", "T032113", "T032111", "T032112", "T032110", "T022835", "T018979", "T024990" ], "last_affected": [ "T028707", "T032108" ] }, "release_date": "2024-01-16T23:00:00Z", "title": "CVE-2023-21901" }, { "cve": "CVE-2023-1436", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T032104", "T032105", "T032102", "T032103", "T032109", "T032106", "T032107", "T019890", "T019891", "T032101", "T018980", "T018981", "T021677", "T022844", "T018983", "T021676", "T028705", "T028706", "T027359", "T032113", "T032111", "T032112", "T032110", "T022835", "T018979", "T024990" ], "last_affected": [ "T028707", "T032108" ] }, "release_date": "2024-01-16T23:00:00Z", "title": "CVE-2023-1436" }, { "cve": "CVE-2023-1370", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T032104", "T032105", "T032102", "T032103", "T032109", "T032106", "T032107", "T019890", "T019891", "T032101", "T018980", "T018981", "T021677", "T022844", "T018983", "T021676", "T028705", "T028706", "T027359", "T032113", "T032111", "T032112", "T032110", "T022835", "T018979", "T024990" ], "last_affected": [ "T028707", "T032108" ] }, "release_date": "2024-01-16T23:00:00Z", "title": "CVE-2023-1370" }, { "cve": "CVE-2022-44729", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T032104", "T032105", "T032102", "T032103", "T032109", "T032106", "T032107", "T019890", "T019891", "T032101", "T018980", "T018981", "T021677", "T022844", "T018983", "T021676", "T028705", "T028706", "T027359", "T032113", "T032111", "T032112", "T032110", "T022835", "T018979", "T024990" ], "last_affected": [ "T028707", "T032108" ] }, "release_date": "2024-01-16T23:00:00Z", "title": "CVE-2022-44729" }, { "cve": "CVE-2022-42920", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T032104", "T032105", "T032102", "T032103", "T032109", "T032106", "T032107", "T019890", "T019891", "T032101", "T018980", "T018981", "T021677", "T022844", "T018983", "T021676", "T028705", "T028706", "T027359", "T032113", "T032111", "T032112", "T032110", "T022835", "T018979", "T024990" ], "last_affected": [ "T028707", "T032108" ] }, "release_date": "2024-01-16T23:00:00Z", "title": "CVE-2022-42920" }, { "cve": "CVE-2022-42003", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T032104", "T032105", "T032102", "T032103", "T032109", "T032106", "T032107", "T019890", "T019891", "T032101", "T018980", "T018981", "T021677", "T022844", "T018983", "T021676", "T028705", "T028706", "T027359", "T032113", "T032111", "T032112", "T032110", "T022835", "T018979", "T024990" ], "last_affected": [ "T028707", "T032108" ] }, "release_date": "2024-01-16T23:00:00Z", "title": "CVE-2022-42003" }, { "cve": "CVE-2022-36944", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T032104", "T032105", "T032102", "T032103", "T032109", "T032106", "T032107", "T019890", "T019891", "T032101", "T018980", "T018981", "T021677", "T022844", "T018983", "T021676", "T028705", "T028706", "T027359", "T032113", "T032111", "T032112", "T032110", "T022835", "T018979", "T024990" ], "last_affected": [ "T028707", "T032108" ] }, "release_date": "2024-01-16T23:00:00Z", "title": "CVE-2022-36944" }, { "cve": "CVE-2022-36033", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T032104", "T032105", "T032102", "T032103", "T032109", "T032106", "T032107", "T019890", "T019891", "T032101", "T018980", "T018981", "T021677", "T022844", "T018983", "T021676", "T028705", "T028706", "T027359", "T032113", "T032111", "T032112", "T032110", "T022835", "T018979", "T024990" ], "last_affected": [ "T028707", "T032108" ] }, "release_date": "2024-01-16T23:00:00Z", "title": "CVE-2022-36033" }, { "cve": "CVE-2022-34169", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T032104", "T032105", "T032102", "T032103", "T032109", "T032106", "T032107", "T019890", "T019891", "T032101", "T018980", "T018981", "T021677", "T022844", "T018983", "T021676", "T028705", "T028706", "T027359", "T032113", "T032111", "T032112", "T032110", "T022835", "T018979", "T024990" ], "last_affected": [ "T028707", "T032108" ] }, "release_date": "2024-01-16T23:00:00Z", "title": "CVE-2022-34169" }, { "cve": "CVE-2022-31692", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T032104", "T032105", "T032102", "T032103", "T032109", "T032106", "T032107", "T019890", "T019891", "T032101", "T018980", "T018981", "T021677", "T022844", "T018983", "T021676", "T028705", "T028706", "T027359", "T032113", "T032111", "T032112", "T032110", "T022835", "T018979", "T024990" ], "last_affected": [ "T028707", "T032108" ] }, "release_date": "2024-01-16T23:00:00Z", "title": "CVE-2022-31692" }, { "cve": "CVE-2022-31160", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T032104", "T032105", "T032102", "T032103", "T032109", "T032106", "T032107", "T019890", "T019891", "T032101", "T018980", "T018981", "T021677", "T022844", "T018983", "T021676", "T028705", "T028706", "T027359", "T032113", "T032111", "T032112", "T032110", "T022835", "T018979", "T024990" ], "last_affected": [ "T028707", "T032108" ] }, "release_date": "2024-01-16T23:00:00Z", "title": "CVE-2022-31160" }, { "cve": "CVE-2022-25147", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T032104", "T032105", "T032102", "T032103", "T032109", "T032106", "T032107", "T019890", "T019891", "T032101", "T018980", "T018981", "T021677", "T022844", "T018983", "T021676", "T028705", "T028706", "T027359", "T032113", "T032111", "T032112", "T032110", "T022835", "T018979", "T024990" ], "last_affected": [ "T028707", "T032108" ] }, "release_date": "2024-01-16T23:00:00Z", "title": "CVE-2022-25147" }, { "cve": "CVE-2022-22979", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T032104", "T032105", "T032102", "T032103", "T032109", "T032106", "T032107", "T019890", "T019891", "T032101", "T018980", "T018981", "T021677", "T022844", "T018983", "T021676", "T028705", "T028706", "T027359", "T032113", "T032111", "T032112", "T032110", "T022835", "T018979", "T024990" ], "last_affected": [ "T028707", "T032108" ] }, "release_date": "2024-01-16T23:00:00Z", "title": "CVE-2022-22979" }, { "cve": "CVE-2022-22969", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T032104", "T032105", "T032102", "T032103", "T032109", "T032106", "T032107", "T019890", "T019891", "T032101", "T018980", "T018981", "T021677", "T022844", "T018983", "T021676", "T028705", "T028706", "T027359", "T032113", "T032111", "T032112", "T032110", "T022835", "T018979", "T024990" ], "last_affected": [ "T028707", "T032108" ] }, "release_date": "2024-01-16T23:00:00Z", "title": "CVE-2022-22969" }, { "cve": "CVE-2020-5410", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T032104", "T032105", "T032102", "T032103", "T032109", "T032106", "T032107", "T019890", "T019891", "T032101", "T018980", "T018981", "T021677", "T022844", "T018983", "T021676", "T028705", "T028706", "T027359", "T032113", "T032111", "T032112", "T032110", "T022835", "T018979", "T024990" ], "last_affected": [ "T028707", "T032108" ] }, "release_date": "2024-01-16T23:00:00Z", "title": "CVE-2020-5410" }, { "cve": "CVE-2020-15250", "notes": [ { "category": "description", "text": "In Oracle Financial Services Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T032104", "T032105", "T032102", "T032103", "T032109", "T032106", "T032107", "T019890", "T019891", "T032101", "T018980", "T018981", "T021677", "T022844", "T018983", "T021676", "T028705", "T028706", "T027359", "T032113", "T032111", "T032112", "T032110", "T022835", "T018979", "T024990" ], "last_affected": [ "T028707", "T032108" ] }, "release_date": "2024-01-16T23:00:00Z", "title": "CVE-2020-15250" } ] }
wid-sec-w-2024-0788
Vulnerability from csaf_certbund
Published
2024-04-03 22:00
Modified
2024-04-03 22:00
Summary
IBM Business Automation Workflow: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
IBM Business Automation Workflow ist eine Lösung zur Automatisierung von Arbeitsabläufen.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in IBM Business Automation Workflow ausnutzen, um beliebigen Programmcode auszuführen oder Sicherheitsvorkehrungen zu umgehen.
Betroffene Betriebssysteme
- Sonstiges
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "IBM Business Automation Workflow ist eine L\u00f6sung zur Automatisierung von Arbeitsabl\u00e4ufen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in IBM Business Automation Workflow ausnutzen, um beliebigen Programmcode auszuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen.", "title": "Angriff" }, { "category": "general", "text": "- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0788 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0788.json" }, { "category": "self", "summary": "WID-SEC-2024-0788 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0788" }, { "category": "external", "summary": "IBM Security Bulletin vom 2024-04-03", "url": "https://www.ibm.com/support/pages/node/7145900" } ], "source_lang": "en-US", "title": "IBM Business Automation Workflow: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-04-03T22:00:00.000+00:00", "generator": { "date": "2024-04-04T11:05:57.909+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2024-0788", "initial_release_date": "2024-04-03T22:00:00.000+00:00", "revision_history": [ { "date": "2024-04-03T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c 23.0.2-IF003", "product": { "name": "IBM Business Automation Workflow \u003c 23.0.2-IF003", "product_id": "T033899", "product_identification_helper": { "cpe": "cpe:/a:ibm:business_automation_workflow:23.0.2-if003" } } } ], "category": "product_name", "name": "Business Automation Workflow" } ], "category": "vendor", "name": "IBM" } ] }, "vulnerabilities": [ { "cve": "CVE-2014-0107", "notes": [ { "category": "description", "text": "In IBM Business Automation Workflow existieren mehrere Schwachstellen. Diese bestehen in der Drittanbieter-Komponente \"Apache Xalan-Java\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen." } ], "release_date": "2024-04-03T22:00:00Z", "title": "CVE-2014-0107" }, { "cve": "CVE-2022-34169", "notes": [ { "category": "description", "text": "In IBM Business Automation Workflow existieren mehrere Schwachstellen. Diese bestehen in der Drittanbieter-Komponente \"Apache Xalan-Java\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen." } ], "release_date": "2024-04-03T22:00:00Z", "title": "CVE-2022-34169" } ] }
wid-sec-w-2024-0794
Vulnerability from csaf_certbund
Published
2024-04-04 22:00
Modified
2024-04-04 22:00
Summary
Dell ECS: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Dell ECS ist ein Objektspeichersystem.
Angriff
Ein Angreifer kann mehrere Schwachstellen in Dell ECS ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
Betroffene Betriebssysteme
- Linux
- UNIX
- Windows
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Dell ECS ist ein Objektspeichersystem.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Dell ECS ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0794 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0794.json" }, { "category": "self", "summary": "WID-SEC-2024-0794 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0794" }, { "category": "external", "summary": "Dell Security Advisory DSA-2024-141 vom 2024-04-04", "url": "https://www.dell.com/support/kbdoc/000223839/dsa-2024-=" } ], "source_lang": "en-US", "title": "Dell ECS: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-04-04T22:00:00.000+00:00", "generator": { "date": "2024-04-05T09:37:24.604+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2024-0794", "initial_release_date": "2024-04-04T22:00:00.000+00:00", "revision_history": [ { "date": "2024-04-04T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c 3.8.1.0", "product": { "name": "Dell ECS \u003c 3.8.1.0", "product_id": "T033919", "product_identification_helper": { "cpe": "cpe:/h:dell:ecs:3.8.1.0" } } } ], "category": "product_name", "name": "ECS" } ], "category": "vendor", "name": "Dell" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-18074", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2018-18074" }, { "cve": "CVE-2020-10663", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10663" }, { "cve": "CVE-2020-10672", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10672" }, { "cve": "CVE-2020-10673", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10673" }, { "cve": "CVE-2020-10735", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10735" }, { "cve": "CVE-2020-10968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10968" }, { "cve": "CVE-2020-10969", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10969" }, { "cve": "CVE-2020-11111", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11111" }, { "cve": "CVE-2020-11112", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11112" }, { "cve": "CVE-2020-11113", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11113" }, { "cve": "CVE-2020-11612", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11612" }, { "cve": "CVE-2020-11619", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11619" }, { "cve": "CVE-2020-11620", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11620" }, { "cve": "CVE-2020-11979", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11979" }, { "cve": "CVE-2020-12762", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-12762" }, { "cve": "CVE-2020-12825", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-12825" }, { "cve": "CVE-2020-13956", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-13956" }, { "cve": "CVE-2020-14060", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14060" }, { "cve": "CVE-2020-14061", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14061" }, { "cve": "CVE-2020-14062", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14062" }, { "cve": "CVE-2020-14195", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14195" }, { "cve": "CVE-2020-15250", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-15250" }, { "cve": "CVE-2020-1945", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-1945" }, { "cve": "CVE-2020-1967", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-1967" }, { "cve": "CVE-2020-1971", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-1971" }, { "cve": "CVE-2020-24616", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-24616" }, { "cve": "CVE-2020-24750", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-24750" }, { "cve": "CVE-2020-25649", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-25649" }, { "cve": "CVE-2020-25658", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-25658" }, { "cve": "CVE-2020-26116", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-26116" }, { "cve": "CVE-2020-26137", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-26137" }, { "cve": "CVE-2020-26541", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-26541" }, { "cve": "CVE-2020-27216", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-27216" }, { "cve": "CVE-2020-27218", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-27218" }, { "cve": "CVE-2020-27223", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-27223" }, { "cve": "CVE-2020-28366", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-28366" }, { "cve": "CVE-2020-28493", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-28493" }, { "cve": "CVE-2020-29509", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29509" }, { "cve": "CVE-2020-29511", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29511" }, { "cve": "CVE-2020-29582", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29582" }, { "cve": "CVE-2020-29651", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29651" }, { "cve": "CVE-2020-35490", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-35490" }, { "cve": "CVE-2020-35491", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-35491" }, { "cve": "CVE-2020-35728", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-35728" }, { "cve": "CVE-2020-36179", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36179" }, { "cve": "CVE-2020-36180", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36180" }, { "cve": "CVE-2020-36181", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36181" }, { "cve": "CVE-2020-36182", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36182" }, { "cve": "CVE-2020-36183", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36183" }, { "cve": "CVE-2020-36184", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36184" }, { "cve": "CVE-2020-36185", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36185" }, { "cve": "CVE-2020-36186", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36186" }, { "cve": "CVE-2020-36187", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36187" }, { "cve": "CVE-2020-36188", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36188" }, { "cve": "CVE-2020-36189", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36189" }, { "cve": "CVE-2020-36516", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36516" }, { "cve": "CVE-2020-36518", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36518" }, { "cve": "CVE-2020-36557", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36557" }, { "cve": "CVE-2020-36558", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36558" }, { "cve": "CVE-2020-36691", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36691" }, { "cve": "CVE-2020-7238", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-7238" }, { "cve": "CVE-2020-8840", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8840" }, { "cve": "CVE-2020-8908", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8908" }, { "cve": "CVE-2020-8911", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8911" }, { "cve": "CVE-2020-8912", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8912" }, { "cve": "CVE-2020-9488", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9488" }, { "cve": "CVE-2020-9493", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9493" }, { "cve": "CVE-2020-9546", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9546" }, { "cve": "CVE-2020-9547", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9547" }, { "cve": "CVE-2020-9548", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9548" }, { "cve": "CVE-2021-20190", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-20190" }, { "cve": "CVE-2021-20323", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-20323" }, { "cve": "CVE-2021-21290", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-21290" }, { "cve": "CVE-2021-21295", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-21295" }, { "cve": "CVE-2021-21409", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-21409" }, { "cve": "CVE-2021-23840", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-23840" }, { "cve": "CVE-2021-23841", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-23841" }, { "cve": "CVE-2021-2471", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-2471" }, { "cve": "CVE-2021-25642", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-25642" }, { "cve": "CVE-2021-26341", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-26341" }, { "cve": "CVE-2021-27918", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-27918" }, { "cve": "CVE-2021-28153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28153" }, { "cve": "CVE-2021-28165", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28165" }, { "cve": "CVE-2021-28169", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28169" }, { "cve": "CVE-2021-28861", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28861" }, { "cve": "CVE-2021-29425", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-29425" }, { "cve": "CVE-2021-30560", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-30560" }, { "cve": "CVE-2021-3114", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3114" }, { "cve": "CVE-2021-33036", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33036" }, { "cve": "CVE-2021-33194", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33194" }, { "cve": "CVE-2021-33195", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33195" }, { "cve": "CVE-2021-33196", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33196" }, { "cve": "CVE-2021-33197", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33197" }, { "cve": "CVE-2021-33503", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33503" }, { "cve": "CVE-2021-33655", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33655" }, { "cve": "CVE-2021-33656", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33656" }, { "cve": "CVE-2021-3424", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3424" }, { "cve": "CVE-2021-34428", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-34428" }, { "cve": "CVE-2021-3449", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3449" }, { "cve": "CVE-2021-3450", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3450" }, { "cve": "CVE-2021-3530", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3530" }, { "cve": "CVE-2021-36221", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36221" }, { "cve": "CVE-2021-36373", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36373" }, { "cve": "CVE-2021-36374", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36374" }, { "cve": "CVE-2021-3648", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3648" }, { "cve": "CVE-2021-36690", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36690" }, { "cve": "CVE-2021-3711", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3711" }, { "cve": "CVE-2021-3712", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3712" }, { "cve": "CVE-2021-37136", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37136" }, { "cve": "CVE-2021-37137", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37137" }, { "cve": "CVE-2021-37404", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37404" }, { "cve": "CVE-2021-37533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37533" }, { "cve": "CVE-2021-3754", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3754" }, { "cve": "CVE-2021-3778", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3778" }, { "cve": "CVE-2021-3796", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3796" }, { "cve": "CVE-2021-3826", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3826" }, { "cve": "CVE-2021-3827", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3827" }, { "cve": "CVE-2021-38297", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-38297" }, { "cve": "CVE-2021-3872", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3872" }, { "cve": "CVE-2021-3875", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3875" }, { "cve": "CVE-2021-3903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3903" }, { "cve": "CVE-2021-3923", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3923" }, { "cve": "CVE-2021-3927", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3927" }, { "cve": "CVE-2021-3928", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3928" }, { "cve": "CVE-2021-3968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3968" }, { "cve": "CVE-2021-3973", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3973" }, { "cve": "CVE-2021-3974", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3974" }, { "cve": "CVE-2021-3984", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3984" }, { "cve": "CVE-2021-4019", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4019" }, { "cve": "CVE-2021-4037", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4037" }, { "cve": "CVE-2021-4069", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4069" }, { "cve": "CVE-2021-4104", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4104" }, { "cve": "CVE-2021-4136", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4136" }, { "cve": "CVE-2021-4157", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4157" }, { "cve": "CVE-2021-4166", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4166" }, { "cve": "CVE-2021-41771", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-41771" }, { "cve": "CVE-2021-4192", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4192" }, { "cve": "CVE-2021-4193", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4193" }, { "cve": "CVE-2021-4203", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4203" }, { "cve": "CVE-2021-42567", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-42567" }, { "cve": "CVE-2021-43797", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-43797" }, { "cve": "CVE-2021-44531", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44531" }, { "cve": "CVE-2021-44532", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44532" }, { "cve": "CVE-2021-44533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44533" }, { "cve": "CVE-2021-44716", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44716" }, { "cve": "CVE-2021-44878", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44878" }, { "cve": "CVE-2021-45078", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-45078" }, { "cve": "CVE-2021-46195", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-46195" }, { "cve": "CVE-2021-46828", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-46828" }, { "cve": "CVE-2021-46848", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-46848" }, { "cve": "CVE-2022-0128", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0128" }, { "cve": "CVE-2022-0213", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0213" }, { "cve": "CVE-2022-0225", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0225" }, { "cve": "CVE-2022-0261", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0261" }, { "cve": "CVE-2022-0318", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0318" }, { "cve": "CVE-2022-0319", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0319" }, { "cve": "CVE-2022-0351", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0351" }, { "cve": "CVE-2022-0359", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0359" }, { "cve": "CVE-2022-0361", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0361" }, { "cve": "CVE-2022-0392", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0392" }, { "cve": "CVE-2022-0407", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0407" }, { "cve": "CVE-2022-0413", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0413" }, { "cve": "CVE-2022-0561", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0561" }, { "cve": "CVE-2022-0696", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0696" }, { "cve": "CVE-2022-0778", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0778" }, { "cve": "CVE-2022-1184", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1184" }, { "cve": "CVE-2022-1245", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1245" }, { "cve": "CVE-2022-1271", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1271" }, { "cve": "CVE-2022-1292", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1292" }, { "cve": "CVE-2022-1381", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1381" }, { "cve": "CVE-2022-1420", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1420" }, { "cve": "CVE-2022-1462", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1462" }, { "cve": "CVE-2022-1466", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1466" }, { "cve": "CVE-2022-1471", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1471" }, { "cve": "CVE-2022-1586", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1586" }, { "cve": "CVE-2022-1587", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1587" }, { "cve": "CVE-2022-1616", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1616" }, { "cve": "CVE-2022-1619", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1619" }, { "cve": "CVE-2022-1620", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1620" }, { "cve": "CVE-2022-1679", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1679" }, { "cve": "CVE-2022-1705", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1705" }, { "cve": "CVE-2022-1720", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1720" }, { "cve": "CVE-2022-1729", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1729" }, { "cve": "CVE-2022-1733", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1733" }, { "cve": "CVE-2022-1735", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1735" }, { "cve": "CVE-2022-1771", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1771" }, { "cve": "CVE-2022-1785", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1785" }, { "cve": "CVE-2022-1796", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1796" }, { "cve": "CVE-2022-1851", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1851" }, { "cve": "CVE-2022-1897", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1897" }, { "cve": "CVE-2022-1898", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1898" }, { "cve": "CVE-2022-1927", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1927" }, { "cve": "CVE-2022-1962", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1962" }, { "cve": "CVE-2022-1968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1968" }, { "cve": "CVE-2022-1974", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1974" }, { "cve": "CVE-2022-1975", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1975" }, { "cve": "CVE-2022-20132", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20132" }, { "cve": "CVE-2022-20141", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20141" }, { "cve": "CVE-2022-20154", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20154" }, { "cve": "CVE-2022-20166", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20166" }, { "cve": "CVE-2022-20368", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20368" }, { "cve": "CVE-2022-20369", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20369" }, { "cve": "CVE-2022-2047", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2047" }, { "cve": "CVE-2022-2048", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2048" }, { "cve": "CVE-2022-20567", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20567" }, { "cve": "CVE-2022-2068", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2068" }, { "cve": "CVE-2022-2097", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2097" }, { "cve": "CVE-2022-21216", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21216" }, { "cve": "CVE-2022-21233", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21233" }, { "cve": "CVE-2022-2124", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2124" }, { "cve": "CVE-2022-2125", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2125" }, { "cve": "CVE-2022-2126", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2126" }, { "cve": "CVE-2022-2129", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2129" }, { "cve": "CVE-2022-21363", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21363" }, { "cve": "CVE-2022-21385", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21385" }, { "cve": "CVE-2022-21499", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21499" }, { "cve": "CVE-2022-2153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2153" }, { "cve": "CVE-2022-21540", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21540" }, { "cve": "CVE-2022-21541", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21541" }, { "cve": "CVE-2022-21549", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21549" }, { "cve": "CVE-2022-21618", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21618" }, { "cve": "CVE-2022-21619", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21619" }, { "cve": "CVE-2022-21624", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21624" }, { "cve": "CVE-2022-21626", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21626" }, { "cve": "CVE-2022-21628", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21628" }, { "cve": "CVE-2022-21702", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21702" }, { "cve": "CVE-2022-2175", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2175" }, { "cve": "CVE-2022-2182", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2182" }, { "cve": "CVE-2022-2183", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2183" }, { "cve": "CVE-2022-2206", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2206" }, { "cve": "CVE-2022-2207", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2207" }, { "cve": "CVE-2022-2208", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2208" }, { "cve": "CVE-2022-2210", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2210" }, { "cve": "CVE-2022-2231", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2231" }, { "cve": "CVE-2022-2256", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2256" }, { "cve": "CVE-2022-2257", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2257" }, { "cve": "CVE-2022-2264", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2264" }, { "cve": "CVE-2022-2284", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2284" }, { "cve": "CVE-2022-2285", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2285" }, { "cve": "CVE-2022-2286", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2286" }, { "cve": "CVE-2022-2287", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2287" }, { "cve": "CVE-2022-22976", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-22976" }, { "cve": "CVE-2022-22978", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-22978" }, { "cve": "CVE-2022-2304", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2304" }, { "cve": "CVE-2022-2318", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2318" }, { "cve": "CVE-2022-23302", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23302" }, { "cve": "CVE-2022-23305", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23305" }, { "cve": "CVE-2022-23307", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23307" }, { "cve": "CVE-2022-2343", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2343" }, { "cve": "CVE-2022-2344", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2344" }, { "cve": "CVE-2022-2345", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2345" }, { "cve": "CVE-2022-23471", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23471" }, { "cve": "CVE-2022-23521", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23521" }, { "cve": "CVE-2022-23772", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23772" }, { "cve": "CVE-2022-23773", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23773" }, { "cve": "CVE-2022-24302", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24302" }, { "cve": "CVE-2022-24329", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24329" }, { "cve": "CVE-2022-24823", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24823" }, { "cve": "CVE-2022-24903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24903" }, { "cve": "CVE-2022-2503", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2503" }, { "cve": "CVE-2022-25147", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25147" }, { "cve": "CVE-2022-25168", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25168" }, { "cve": "CVE-2022-2519", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2519" }, { "cve": "CVE-2022-2520", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2520" }, { "cve": "CVE-2022-2521", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2521" }, { "cve": "CVE-2022-2522", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2522" }, { "cve": "CVE-2022-25647", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25647" }, { "cve": "CVE-2022-2571", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2571" }, { "cve": "CVE-2022-2580", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2580" }, { "cve": "CVE-2022-2581", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2581" }, { "cve": "CVE-2022-25857", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25857" }, { "cve": "CVE-2022-2588", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2588" }, { "cve": "CVE-2022-2598", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2598" }, { "cve": "CVE-2022-26148", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26148" }, { "cve": "CVE-2022-26365", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26365" }, { "cve": "CVE-2022-26373", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26373" }, { "cve": "CVE-2022-2639", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2639" }, { "cve": "CVE-2022-26612", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26612" }, { "cve": "CVE-2022-2663", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2663" }, { "cve": "CVE-2022-27781", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-27781" }, { "cve": "CVE-2022-27782", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-27782" }, { "cve": "CVE-2022-27943", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-27943" }, { "cve": "CVE-2022-2795", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2795" }, { "cve": "CVE-2022-28131", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28131" }, { "cve": "CVE-2022-2816", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2816" }, { "cve": "CVE-2022-2817", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2817" }, { "cve": "CVE-2022-2819", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2819" }, { "cve": "CVE-2022-28327", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28327" }, { "cve": "CVE-2022-2845", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2845" }, { "cve": "CVE-2022-2849", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2849" }, { "cve": "CVE-2022-2862", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2862" }, { "cve": "CVE-2022-2867", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2867" }, { "cve": "CVE-2022-2868", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2868" }, { "cve": "CVE-2022-2869", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2869" }, { "cve": "CVE-2022-28693", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28693" }, { "cve": "CVE-2022-2874", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2874" }, { "cve": "CVE-2022-28748", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28748" }, { "cve": "CVE-2022-2880", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2880" }, { "cve": "CVE-2022-2889", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2889" }, { "cve": "CVE-2022-29162", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29162" }, { "cve": "CVE-2022-29187", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29187" }, { "cve": "CVE-2022-2923", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2923" }, { "cve": "CVE-2022-2946", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2946" }, { "cve": "CVE-2022-29526", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29526" }, { "cve": "CVE-2022-29583", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29583" }, { "cve": "CVE-2022-2964", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2964" }, { "cve": "CVE-2022-2977", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2977" }, { "cve": "CVE-2022-2980", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2980" }, { "cve": "CVE-2022-2982", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2982" }, { "cve": "CVE-2022-29900", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29900" }, { "cve": "CVE-2022-29901", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29901" }, { "cve": "CVE-2022-2991", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2991" }, { "cve": "CVE-2022-3016", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3016" }, { "cve": "CVE-2022-3028", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3028" }, { "cve": "CVE-2022-3037", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3037" }, { "cve": "CVE-2022-30580", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30580" }, { "cve": "CVE-2022-30630", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30630" }, { "cve": "CVE-2022-30631", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30631" }, { "cve": "CVE-2022-30632", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30632" }, { "cve": "CVE-2022-30633", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30633" }, { "cve": "CVE-2022-3099", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3099" }, { "cve": "CVE-2022-31030", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-31030" }, { "cve": "CVE-2022-31159", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-31159" }, { "cve": "CVE-2022-3134", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3134" }, { "cve": "CVE-2022-3153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3153" }, { "cve": "CVE-2022-3169", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3169" }, { "cve": "CVE-2022-31690", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-31690" }, { "cve": "CVE-2022-32148", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32148" }, { "cve": "CVE-2022-32149", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32149" }, { "cve": "CVE-2022-32206", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32206" }, { "cve": "CVE-2022-32208", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32208" }, { "cve": "CVE-2022-32221", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32221" }, { "cve": "CVE-2022-3234", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3234" }, { "cve": "CVE-2022-3235", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3235" }, { "cve": "CVE-2022-3239", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3239" }, { "cve": "CVE-2022-3278", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3278" }, { "cve": "CVE-2022-3296", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3296" }, { "cve": "CVE-2022-3297", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3297" }, { "cve": "CVE-2022-33196", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33196" }, { "cve": "CVE-2022-3324", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3324" }, { "cve": "CVE-2022-3352", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3352" }, { "cve": "CVE-2022-33740", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33740" }, { "cve": "CVE-2022-33741", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33741" }, { "cve": "CVE-2022-33742", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33742" }, { "cve": "CVE-2022-33972", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33972" }, { "cve": "CVE-2022-33981", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33981" }, { "cve": "CVE-2022-34169", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34169" }, { "cve": "CVE-2022-3424", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3424" }, { "cve": "CVE-2022-34266", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34266" }, { "cve": "CVE-2022-34526", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34526" }, { "cve": "CVE-2022-34903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34903" }, { "cve": "CVE-2022-3491", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3491" }, { "cve": "CVE-2022-3515", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3515" }, { "cve": "CVE-2022-3520", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3520" }, { "cve": "CVE-2022-3521", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3521" }, { "cve": "CVE-2022-3524", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3524" }, { "cve": "CVE-2022-35252", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-35252" }, { "cve": "CVE-2022-3542", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3542" }, { "cve": "CVE-2022-3545", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3545" }, { "cve": "CVE-2022-3564", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3564" }, { "cve": "CVE-2022-3565", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3565" }, { "cve": "CVE-2022-3566", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3566" }, { "cve": "CVE-2022-3567", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3567" }, { "cve": "CVE-2022-35737", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-35737" }, { "cve": "CVE-2022-3586", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3586" }, { "cve": "CVE-2022-3591", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3591" }, { "cve": "CVE-2022-3594", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3594" }, { "cve": "CVE-2022-3597", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3597" }, { "cve": "CVE-2022-3599", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3599" }, { "cve": "CVE-2022-36109", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36109" }, { "cve": "CVE-2022-3621", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3621" }, { "cve": "CVE-2022-3626", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3626" }, { "cve": "CVE-2022-3627", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3627" }, { "cve": "CVE-2022-3628", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3628" }, { "cve": "CVE-2022-36280", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36280" }, { "cve": "CVE-2022-3629", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3629" }, { "cve": "CVE-2022-3635", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3635" }, { "cve": "CVE-2022-3643", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3643" }, { "cve": "CVE-2022-36437", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36437" }, { "cve": "CVE-2022-3646", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3646" }, { "cve": "CVE-2022-3649", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3649" }, { "cve": "CVE-2022-36760", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36760" }, { "cve": "CVE-2022-36879", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36879" }, { "cve": "CVE-2022-36946", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36946" }, { "cve": "CVE-2022-3705", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3705" }, { "cve": "CVE-2022-37434", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37434" }, { "cve": "CVE-2022-37436", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37436" }, { "cve": "CVE-2022-37865", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37865" }, { "cve": "CVE-2022-37866", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37866" }, { "cve": "CVE-2022-38090", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38090" }, { "cve": "CVE-2022-38096", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38096" }, { "cve": "CVE-2022-38126", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38126" }, { "cve": "CVE-2022-38127", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38127" }, { "cve": "CVE-2022-38177", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38177" }, { "cve": "CVE-2022-38178", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38178" }, { "cve": "CVE-2022-3821", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3821" }, { "cve": "CVE-2022-38533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38533" }, { "cve": "CVE-2022-38749", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38749" }, { "cve": "CVE-2022-38750", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38750" }, { "cve": "CVE-2022-38751", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38751" }, { "cve": "CVE-2022-38752", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38752" }, { "cve": "CVE-2022-39028", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-39028" }, { "cve": "CVE-2022-3903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3903" }, { "cve": "CVE-2022-39188", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-39188" }, { "cve": "CVE-2022-39399", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-39399" }, { "cve": "CVE-2022-3970", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3970" }, { "cve": "CVE-2022-40149", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40149" }, { "cve": "CVE-2022-40150", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40150" }, { "cve": "CVE-2022-40151", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40151" }, { "cve": "CVE-2022-40152", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40152" }, { "cve": "CVE-2022-40153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40153" }, { "cve": "CVE-2022-40303", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40303" }, { "cve": "CVE-2022-40304", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40304" }, { "cve": "CVE-2022-40307", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40307" }, { "cve": "CVE-2022-40674", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40674" }, { "cve": "CVE-2022-40768", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40768" }, { "cve": "CVE-2022-40899", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40899" }, { "cve": "CVE-2022-4095", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4095" }, { "cve": "CVE-2022-41218", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41218" }, { "cve": "CVE-2022-4129", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4129" }, { "cve": "CVE-2022-4141", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4141" }, { "cve": "CVE-2022-41717", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41717" }, { "cve": "CVE-2022-41721", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41721" }, { "cve": "CVE-2022-41848", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41848" }, { "cve": "CVE-2022-41850", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41850" }, { "cve": "CVE-2022-41854", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41854" }, { "cve": "CVE-2022-41858", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41858" }, { "cve": "CVE-2022-41881", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41881" }, { "cve": "CVE-2022-41903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41903" }, { "cve": "CVE-2022-41915", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41915" }, { "cve": "CVE-2022-41966", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41966" }, { "cve": "CVE-2022-41974", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41974" }, { "cve": "CVE-2022-42003", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42003" }, { "cve": "CVE-2022-42004", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42004" }, { "cve": "CVE-2022-42010", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42010" }, { "cve": "CVE-2022-42011", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42011" }, { "cve": "CVE-2022-42012", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42012" }, { "cve": "CVE-2022-42328", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42328" }, { "cve": "CVE-2022-42329", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42329" }, { "cve": "CVE-2022-42703", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42703" }, { "cve": "CVE-2022-42889", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42889" }, { "cve": "CVE-2022-42895", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42895" }, { "cve": "CVE-2022-42896", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42896" }, { "cve": "CVE-2022-42898", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42898" }, { "cve": "CVE-2022-4292", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4292" }, { "cve": "CVE-2022-4293", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4293" }, { "cve": "CVE-2022-42969", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42969" }, { "cve": "CVE-2022-4304", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4304" }, { "cve": "CVE-2022-43552", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43552" }, { "cve": "CVE-2022-43680", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43680" }, { "cve": "CVE-2022-43750", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43750" }, { "cve": "CVE-2022-4378", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4378" }, { "cve": "CVE-2022-43945", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43945" }, { "cve": "CVE-2022-43995", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43995" }, { "cve": "CVE-2022-4415", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4415" }, { "cve": "CVE-2022-4450", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4450" }, { "cve": "CVE-2022-44638", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-44638" }, { "cve": "CVE-2022-45061", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45061" }, { "cve": "CVE-2022-45688", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45688" }, { "cve": "CVE-2022-45884", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45884" }, { "cve": "CVE-2022-45885", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45885" }, { "cve": "CVE-2022-45886", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45886" }, { "cve": "CVE-2022-45887", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45887" }, { "cve": "CVE-2022-45919", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45919" }, { "cve": "CVE-2022-45934", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45934" }, { "cve": "CVE-2022-45939", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45939" }, { "cve": "CVE-2022-4662", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4662" }, { "cve": "CVE-2022-46751", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-46751" }, { "cve": "CVE-2022-46908", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-46908" }, { "cve": "CVE-2022-47629", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-47629" }, { "cve": "CVE-2022-47929", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-47929" }, { "cve": "CVE-2022-48281", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-48281" }, { "cve": "CVE-2022-48337", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-48337" }, { "cve": "CVE-2022-48339", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-48339" }, { "cve": "CVE-2023-0045", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0045" }, { "cve": "CVE-2023-0049", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0049" }, { "cve": "CVE-2023-0051", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0051" }, { "cve": "CVE-2023-0054", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0054" }, { "cve": "CVE-2023-0215", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0215" }, { "cve": "CVE-2023-0286", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0286" }, { "cve": "CVE-2023-0288", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0288" }, { "cve": "CVE-2023-0433", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0433" }, { "cve": "CVE-2023-0464", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0464" }, { "cve": "CVE-2023-0465", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0465" }, { "cve": "CVE-2023-0466", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0466" }, { "cve": "CVE-2023-0512", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0512" }, { "cve": "CVE-2023-0590", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0590" }, { "cve": "CVE-2023-0597", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0597" }, { "cve": "CVE-2023-0833", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0833" }, { "cve": "CVE-2023-1076", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1076" }, { "cve": "CVE-2023-1095", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1095" }, { "cve": "CVE-2023-1118", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1118" }, { "cve": "CVE-2023-1127", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1127" }, { "cve": "CVE-2023-1170", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1170" }, { "cve": "CVE-2023-1175", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1175" }, { "cve": "CVE-2023-1370", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1370" }, { "cve": "CVE-2023-1380", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1380" }, { "cve": "CVE-2023-1390", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1390" }, { "cve": "CVE-2023-1436", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1436" }, { "cve": "CVE-2023-1513", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1513" }, { "cve": "CVE-2023-1611", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1611" }, { "cve": "CVE-2023-1670", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1670" }, { "cve": "CVE-2023-1855", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1855" }, { "cve": "CVE-2023-1989", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1989" }, { "cve": "CVE-2023-1990", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1990" }, { "cve": "CVE-2023-1998", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1998" }, { "cve": "CVE-2023-20862", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-20862" }, { "cve": "CVE-2023-2124", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2124" }, { "cve": "CVE-2023-2162", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2162" }, { "cve": "CVE-2023-2176", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2176" }, { "cve": "CVE-2023-21830", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21830" }, { "cve": "CVE-2023-21835", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21835" }, { "cve": "CVE-2023-21843", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21843" }, { "cve": "CVE-2023-21930", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21930" }, { "cve": "CVE-2023-21937", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21937" }, { "cve": "CVE-2023-21938", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21938" }, { "cve": "CVE-2023-21939", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21939" }, { "cve": "CVE-2023-2194", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2194" }, { "cve": "CVE-2023-21954", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21954" }, { "cve": "CVE-2023-21967", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21967" }, { "cve": "CVE-2023-21968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21968" }, { "cve": "CVE-2023-22490", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-22490" }, { "cve": "CVE-2023-2253", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2253" }, { "cve": "CVE-2023-22809", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-22809" }, { "cve": "CVE-2023-23454", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23454" }, { "cve": "CVE-2023-23455", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23455" }, { "cve": "CVE-2023-23559", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23559" }, { "cve": "CVE-2023-23916", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23916" }, { "cve": "CVE-2023-23946", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23946" }, { "cve": "CVE-2023-24329", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24329" }, { "cve": "CVE-2023-24532", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24532" }, { "cve": "CVE-2023-24534", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24534" }, { "cve": "CVE-2023-2483", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2483" }, { "cve": "CVE-2023-24998", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24998" }, { "cve": "CVE-2023-2513", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2513" }, { "cve": "CVE-2023-25193", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25193" }, { "cve": "CVE-2023-25652", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25652" }, { "cve": "CVE-2023-25690", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25690" }, { "cve": "CVE-2023-25809", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25809" }, { "cve": "CVE-2023-25815", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25815" }, { "cve": "CVE-2023-26048", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26048" }, { "cve": "CVE-2023-26049", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26049" }, { "cve": "CVE-2023-2650", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2650" }, { "cve": "CVE-2023-26545", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26545" }, { "cve": "CVE-2023-26604", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26604" }, { "cve": "CVE-2023-27533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27533" }, { "cve": "CVE-2023-27534", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27534" }, { "cve": "CVE-2023-27535", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27535" }, { "cve": "CVE-2023-27536", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27536" }, { "cve": "CVE-2023-27538", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27538" }, { "cve": "CVE-2023-27561", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27561" }, { "cve": "CVE-2023-2828", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2828" }, { "cve": "CVE-2023-28320", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28320" }, { "cve": "CVE-2023-28321", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28321" }, { "cve": "CVE-2023-28322", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28322" }, { "cve": "CVE-2023-28328", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28328" }, { "cve": "CVE-2023-28464", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28464" }, { "cve": "CVE-2023-28486", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28486" }, { "cve": "CVE-2023-28487", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28487" }, { "cve": "CVE-2023-28642", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28642" }, { "cve": "CVE-2023-28772", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28772" }, { "cve": "CVE-2023-28840", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28840" }, { "cve": "CVE-2023-28841", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28841" }, { "cve": "CVE-2023-28842", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28842" }, { "cve": "CVE-2023-29007", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29007" }, { "cve": "CVE-2023-29383", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29383" }, { "cve": "CVE-2023-29402", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29402" }, { "cve": "CVE-2023-29406", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29406" }, { "cve": "CVE-2023-29409", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29409" }, { "cve": "CVE-2023-2976", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2976" }, { "cve": "CVE-2023-30630", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-30630" }, { "cve": "CVE-2023-30772", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-30772" }, { "cve": "CVE-2023-31084", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-31084" }, { "cve": "CVE-2023-3138", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-3138" }, { "cve": "CVE-2023-31436", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-31436" }, { "cve": "CVE-2023-31484", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-31484" }, { "cve": "CVE-2023-32269", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-32269" }, { "cve": "CVE-2023-32697", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-32697" }, { "cve": "CVE-2023-33264", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-33264" }, { "cve": "CVE-2023-34034", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34034" }, { "cve": "CVE-2023-34035", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34035" }, { "cve": "CVE-2023-34453", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34453" }, { "cve": "CVE-2023-34454", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34454" }, { "cve": "CVE-2023-34455", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34455" }, { "cve": "CVE-2023-34462", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34462" }, { "cve": "CVE-2023-35116", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-35116" }, { "cve": "CVE-2023-3635", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-3635" }, { "cve": "CVE-2023-36479", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-36479" }, { "cve": "CVE-2023-39533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-39533" }, { "cve": "CVE-2023-40167", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-40167" }, { "cve": "CVE-2023-40217", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-40217" }, { "cve": "CVE-2023-41105", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-41105" }, { "cve": "CVE-2023-41900", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-41900" }, { "cve": "CVE-2023-43642", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-43642" }, { "cve": "CVE-2023-43804", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-43804" }, { "cve": "CVE-2023-44487", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-44487" }, { "cve": "CVE-2023-45803", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-45803" }, { "cve": "CVE-2024-21626", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2024-21626" } ] }
wid-sec-w-2023-1032
Vulnerability from csaf_certbund
Published
2023-04-18 22:00
Modified
2023-04-18 22:00
Summary
Oracle PeopleSoft: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Oracle PeopleSoft ist eine ERP Anwendung.
Angriff
Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Oracle PeopleSoft ausnutzen, um die Vertraulichkeit, Integrität und Verfügbarkeit zu gefährden.
Betroffene Betriebssysteme
- UNIX
- Linux
- Windows
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Oracle PeopleSoft ist eine ERP Anwendung.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Oracle PeopleSoft ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-1032 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1032.json" }, { "category": "self", "summary": "WID-SEC-2023-1032 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1032" }, { "category": "external", "summary": "Oracle Critical Patch Update Advisory - April 2023 - Appendix Oracle PeopleSoft vom 2023-04-18", "url": "https://www.oracle.com/security-alerts/cpuapr2023.html#AppendixPS" } ], "source_lang": "en-US", "title": "Oracle PeopleSoft: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-04-18T22:00:00.000+00:00", "generator": { "date": "2024-02-15T17:24:58.473+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-1032", "initial_release_date": "2023-04-18T22:00:00.000+00:00", "revision_history": [ { "date": "2023-04-18T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Oracle PeopleSoft 8.58", "product": { "name": "Oracle PeopleSoft 8.58", "product_id": "T019029", "product_identification_helper": { "cpe": "cpe:/a:oracle:peoplesoft:8.58" } } }, { "category": "product_name", "name": "Oracle PeopleSoft 9.2", "product": { "name": "Oracle PeopleSoft 9.2", "product_id": "T019030", "product_identification_helper": { "cpe": "cpe:/a:oracle:peoplesoft:9.2" } } }, { "category": "product_name", "name": "Oracle PeopleSoft 8.59", "product": { "name": "Oracle PeopleSoft 8.59", "product_id": "T019905", "product_identification_helper": { "cpe": "cpe:/a:oracle:peoplesoft:8.59" } } }, { "category": "product_name", "name": "Oracle PeopleSoft 8.60", "product": { "name": "Oracle PeopleSoft 8.60", "product_id": "T025008", "product_identification_helper": { "cpe": "cpe:/a:oracle:peoplesoft:8.60" } } } ], "category": "product_name", "name": "PeopleSoft" } ], "category": "vendor", "name": "Oracle" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-21992", "notes": [ { "category": "description", "text": "In Oracle PeopleSoft existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T019029", "T025008", "T019030", "T019905" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2023-21992" }, { "cve": "CVE-2023-21981", "notes": [ { "category": "description", "text": "In Oracle PeopleSoft existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T019029", "T025008", "T019030", "T019905" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2023-21981" }, { "cve": "CVE-2023-21916", "notes": [ { "category": "description", "text": "In Oracle PeopleSoft existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T019029", "T025008", "T019030", "T019905" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2023-21916" }, { "cve": "CVE-2022-45685", "notes": [ { "category": "description", "text": "In Oracle PeopleSoft existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T019029", "T025008", "T019030", "T019905" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-45685" }, { "cve": "CVE-2022-45047", "notes": [ { "category": "description", "text": "In Oracle PeopleSoft existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T019029", "T025008", "T019030", "T019905" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-45047" }, { "cve": "CVE-2022-41881", "notes": [ { "category": "description", "text": "In Oracle PeopleSoft existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T019029", "T025008", "T019030", "T019905" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-41881" }, { "cve": "CVE-2022-36033", "notes": [ { "category": "description", "text": "In Oracle PeopleSoft existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T019029", "T025008", "T019030", "T019905" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-36033" }, { "cve": "CVE-2022-34169", "notes": [ { "category": "description", "text": "In Oracle PeopleSoft existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T019029", "T025008", "T019030", "T019905" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-34169" }, { "cve": "CVE-2021-37533", "notes": [ { "category": "description", "text": "In Oracle PeopleSoft existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T019029", "T025008", "T019030", "T019905" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2021-37533" }, { "cve": "CVE-2020-14343", "notes": [ { "category": "description", "text": "In Oracle PeopleSoft existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T019029", "T025008", "T019030", "T019905" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2020-14343" } ] }
WID-SEC-W-2024-0794
Vulnerability from csaf_certbund
Published
2024-04-04 22:00
Modified
2024-04-04 22:00
Summary
Dell ECS: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Dell ECS ist ein Objektspeichersystem.
Angriff
Ein Angreifer kann mehrere Schwachstellen in Dell ECS ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
Betroffene Betriebssysteme
- Linux
- UNIX
- Windows
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Dell ECS ist ein Objektspeichersystem.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Dell ECS ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0794 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0794.json" }, { "category": "self", "summary": "WID-SEC-2024-0794 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0794" }, { "category": "external", "summary": "Dell Security Advisory DSA-2024-141 vom 2024-04-04", "url": "https://www.dell.com/support/kbdoc/000223839/dsa-2024-=" } ], "source_lang": "en-US", "title": "Dell ECS: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-04-04T22:00:00.000+00:00", "generator": { "date": "2024-04-05T09:37:24.604+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2024-0794", "initial_release_date": "2024-04-04T22:00:00.000+00:00", "revision_history": [ { "date": "2024-04-04T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c 3.8.1.0", "product": { "name": "Dell ECS \u003c 3.8.1.0", "product_id": "T033919", "product_identification_helper": { "cpe": "cpe:/h:dell:ecs:3.8.1.0" } } } ], "category": "product_name", "name": "ECS" } ], "category": "vendor", "name": "Dell" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-18074", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2018-18074" }, { "cve": "CVE-2020-10663", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10663" }, { "cve": "CVE-2020-10672", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10672" }, { "cve": "CVE-2020-10673", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10673" }, { "cve": "CVE-2020-10735", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10735" }, { "cve": "CVE-2020-10968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10968" }, { "cve": "CVE-2020-10969", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10969" }, { "cve": "CVE-2020-11111", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11111" }, { "cve": "CVE-2020-11112", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11112" }, { "cve": "CVE-2020-11113", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11113" }, { "cve": "CVE-2020-11612", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11612" }, { "cve": "CVE-2020-11619", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11619" }, { "cve": "CVE-2020-11620", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11620" }, { "cve": "CVE-2020-11979", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11979" }, { "cve": "CVE-2020-12762", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-12762" }, { "cve": "CVE-2020-12825", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-12825" }, { "cve": "CVE-2020-13956", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-13956" }, { "cve": "CVE-2020-14060", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14060" }, { "cve": "CVE-2020-14061", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14061" }, { "cve": "CVE-2020-14062", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14062" }, { "cve": "CVE-2020-14195", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14195" }, { "cve": "CVE-2020-15250", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-15250" }, { "cve": "CVE-2020-1945", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-1945" }, { "cve": "CVE-2020-1967", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-1967" }, { "cve": "CVE-2020-1971", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-1971" }, { "cve": "CVE-2020-24616", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-24616" }, { "cve": "CVE-2020-24750", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-24750" }, { "cve": "CVE-2020-25649", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-25649" }, { "cve": "CVE-2020-25658", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-25658" }, { "cve": "CVE-2020-26116", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-26116" }, { "cve": "CVE-2020-26137", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-26137" }, { "cve": "CVE-2020-26541", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-26541" }, { "cve": "CVE-2020-27216", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-27216" }, { "cve": "CVE-2020-27218", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-27218" }, { "cve": "CVE-2020-27223", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-27223" }, { "cve": "CVE-2020-28366", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-28366" }, { "cve": "CVE-2020-28493", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-28493" }, { "cve": "CVE-2020-29509", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29509" }, { "cve": "CVE-2020-29511", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29511" }, { "cve": "CVE-2020-29582", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29582" }, { "cve": "CVE-2020-29651", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29651" }, { "cve": "CVE-2020-35490", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-35490" }, { "cve": "CVE-2020-35491", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-35491" }, { "cve": "CVE-2020-35728", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-35728" }, { "cve": "CVE-2020-36179", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36179" }, { "cve": "CVE-2020-36180", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36180" }, { "cve": "CVE-2020-36181", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36181" }, { "cve": "CVE-2020-36182", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36182" }, { "cve": "CVE-2020-36183", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36183" }, { "cve": "CVE-2020-36184", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36184" }, { "cve": "CVE-2020-36185", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36185" }, { "cve": "CVE-2020-36186", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36186" }, { "cve": "CVE-2020-36187", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36187" }, { "cve": "CVE-2020-36188", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36188" }, { "cve": "CVE-2020-36189", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36189" }, { "cve": "CVE-2020-36516", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36516" }, { "cve": "CVE-2020-36518", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36518" }, { "cve": "CVE-2020-36557", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36557" }, { "cve": "CVE-2020-36558", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36558" }, { "cve": "CVE-2020-36691", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36691" }, { "cve": "CVE-2020-7238", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-7238" }, { "cve": "CVE-2020-8840", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8840" }, { "cve": "CVE-2020-8908", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8908" }, { "cve": "CVE-2020-8911", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8911" }, { "cve": "CVE-2020-8912", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8912" }, { "cve": "CVE-2020-9488", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9488" }, { "cve": "CVE-2020-9493", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9493" }, { "cve": "CVE-2020-9546", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9546" }, { "cve": "CVE-2020-9547", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9547" }, { "cve": "CVE-2020-9548", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9548" }, { "cve": "CVE-2021-20190", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-20190" }, { "cve": "CVE-2021-20323", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-20323" }, { "cve": "CVE-2021-21290", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-21290" }, { "cve": "CVE-2021-21295", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-21295" }, { "cve": "CVE-2021-21409", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-21409" }, { "cve": "CVE-2021-23840", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-23840" }, { "cve": "CVE-2021-23841", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-23841" }, { "cve": "CVE-2021-2471", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-2471" }, { "cve": "CVE-2021-25642", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-25642" }, { "cve": "CVE-2021-26341", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-26341" }, { "cve": "CVE-2021-27918", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-27918" }, { "cve": "CVE-2021-28153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28153" }, { "cve": "CVE-2021-28165", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28165" }, { "cve": "CVE-2021-28169", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28169" }, { "cve": "CVE-2021-28861", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28861" }, { "cve": "CVE-2021-29425", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-29425" }, { "cve": "CVE-2021-30560", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-30560" }, { "cve": "CVE-2021-3114", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3114" }, { "cve": "CVE-2021-33036", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33036" }, { "cve": "CVE-2021-33194", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33194" }, { "cve": "CVE-2021-33195", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33195" }, { "cve": "CVE-2021-33196", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33196" }, { "cve": "CVE-2021-33197", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33197" }, { "cve": "CVE-2021-33503", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33503" }, { "cve": "CVE-2021-33655", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33655" }, { "cve": "CVE-2021-33656", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33656" }, { "cve": "CVE-2021-3424", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3424" }, { "cve": "CVE-2021-34428", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-34428" }, { "cve": "CVE-2021-3449", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3449" }, { "cve": "CVE-2021-3450", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3450" }, { "cve": "CVE-2021-3530", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3530" }, { "cve": "CVE-2021-36221", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36221" }, { "cve": "CVE-2021-36373", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36373" }, { "cve": "CVE-2021-36374", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36374" }, { "cve": "CVE-2021-3648", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3648" }, { "cve": "CVE-2021-36690", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36690" }, { "cve": "CVE-2021-3711", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3711" }, { "cve": "CVE-2021-3712", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3712" }, { "cve": "CVE-2021-37136", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37136" }, { "cve": "CVE-2021-37137", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37137" }, { "cve": "CVE-2021-37404", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37404" }, { "cve": "CVE-2021-37533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37533" }, { "cve": "CVE-2021-3754", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3754" }, { "cve": "CVE-2021-3778", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3778" }, { "cve": "CVE-2021-3796", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3796" }, { "cve": "CVE-2021-3826", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3826" }, { "cve": "CVE-2021-3827", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3827" }, { "cve": "CVE-2021-38297", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-38297" }, { "cve": "CVE-2021-3872", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3872" }, { "cve": "CVE-2021-3875", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3875" }, { "cve": "CVE-2021-3903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3903" }, { "cve": "CVE-2021-3923", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3923" }, { "cve": "CVE-2021-3927", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3927" }, { "cve": "CVE-2021-3928", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3928" }, { "cve": "CVE-2021-3968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3968" }, { "cve": "CVE-2021-3973", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3973" }, { "cve": "CVE-2021-3974", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3974" }, { "cve": "CVE-2021-3984", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3984" }, { "cve": "CVE-2021-4019", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4019" }, { "cve": "CVE-2021-4037", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4037" }, { "cve": "CVE-2021-4069", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4069" }, { "cve": "CVE-2021-4104", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4104" }, { "cve": "CVE-2021-4136", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4136" }, { "cve": "CVE-2021-4157", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4157" }, { "cve": "CVE-2021-4166", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4166" }, { "cve": "CVE-2021-41771", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-41771" }, { "cve": "CVE-2021-4192", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4192" }, { "cve": "CVE-2021-4193", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4193" }, { "cve": "CVE-2021-4203", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4203" }, { "cve": "CVE-2021-42567", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-42567" }, { "cve": "CVE-2021-43797", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-43797" }, { "cve": "CVE-2021-44531", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44531" }, { "cve": "CVE-2021-44532", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44532" }, { "cve": "CVE-2021-44533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44533" }, { "cve": "CVE-2021-44716", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44716" }, { "cve": "CVE-2021-44878", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44878" }, { "cve": "CVE-2021-45078", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-45078" }, { "cve": "CVE-2021-46195", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-46195" }, { "cve": "CVE-2021-46828", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-46828" }, { "cve": "CVE-2021-46848", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-46848" }, { "cve": "CVE-2022-0128", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0128" }, { "cve": "CVE-2022-0213", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0213" }, { "cve": "CVE-2022-0225", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0225" }, { "cve": "CVE-2022-0261", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0261" }, { "cve": "CVE-2022-0318", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0318" }, { "cve": "CVE-2022-0319", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0319" }, { "cve": "CVE-2022-0351", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0351" }, { "cve": "CVE-2022-0359", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0359" }, { "cve": "CVE-2022-0361", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0361" }, { "cve": "CVE-2022-0392", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0392" }, { "cve": "CVE-2022-0407", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0407" }, { "cve": "CVE-2022-0413", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0413" }, { "cve": "CVE-2022-0561", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0561" }, { "cve": "CVE-2022-0696", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0696" }, { "cve": "CVE-2022-0778", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0778" }, { "cve": "CVE-2022-1184", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1184" }, { "cve": "CVE-2022-1245", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1245" }, { "cve": "CVE-2022-1271", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1271" }, { "cve": "CVE-2022-1292", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1292" }, { "cve": "CVE-2022-1381", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1381" }, { "cve": "CVE-2022-1420", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1420" }, { "cve": "CVE-2022-1462", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1462" }, { "cve": "CVE-2022-1466", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1466" }, { "cve": "CVE-2022-1471", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1471" }, { "cve": "CVE-2022-1586", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1586" }, { "cve": "CVE-2022-1587", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1587" }, { "cve": "CVE-2022-1616", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1616" }, { "cve": "CVE-2022-1619", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1619" }, { "cve": "CVE-2022-1620", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1620" }, { "cve": "CVE-2022-1679", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1679" }, { "cve": "CVE-2022-1705", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1705" }, { "cve": "CVE-2022-1720", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1720" }, { "cve": "CVE-2022-1729", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1729" }, { "cve": "CVE-2022-1733", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1733" }, { "cve": "CVE-2022-1735", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1735" }, { "cve": "CVE-2022-1771", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1771" }, { "cve": "CVE-2022-1785", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1785" }, { "cve": "CVE-2022-1796", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1796" }, { "cve": "CVE-2022-1851", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1851" }, { "cve": "CVE-2022-1897", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1897" }, { "cve": "CVE-2022-1898", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1898" }, { "cve": "CVE-2022-1927", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1927" }, { "cve": "CVE-2022-1962", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1962" }, { "cve": "CVE-2022-1968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1968" }, { "cve": "CVE-2022-1974", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1974" }, { "cve": "CVE-2022-1975", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1975" }, { "cve": "CVE-2022-20132", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20132" }, { "cve": "CVE-2022-20141", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20141" }, { "cve": "CVE-2022-20154", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20154" }, { "cve": "CVE-2022-20166", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20166" }, { "cve": "CVE-2022-20368", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20368" }, { "cve": "CVE-2022-20369", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20369" }, { "cve": "CVE-2022-2047", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2047" }, { "cve": "CVE-2022-2048", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2048" }, { "cve": "CVE-2022-20567", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20567" }, { "cve": "CVE-2022-2068", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2068" }, { "cve": "CVE-2022-2097", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2097" }, { "cve": "CVE-2022-21216", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21216" }, { "cve": "CVE-2022-21233", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21233" }, { "cve": "CVE-2022-2124", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2124" }, { "cve": "CVE-2022-2125", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2125" }, { "cve": "CVE-2022-2126", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2126" }, { "cve": "CVE-2022-2129", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2129" }, { "cve": "CVE-2022-21363", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21363" }, { "cve": "CVE-2022-21385", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21385" }, { "cve": "CVE-2022-21499", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21499" }, { "cve": "CVE-2022-2153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2153" }, { "cve": "CVE-2022-21540", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21540" }, { "cve": "CVE-2022-21541", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21541" }, { "cve": "CVE-2022-21549", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21549" }, { "cve": "CVE-2022-21618", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21618" }, { "cve": "CVE-2022-21619", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21619" }, { "cve": "CVE-2022-21624", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21624" }, { "cve": "CVE-2022-21626", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21626" }, { "cve": "CVE-2022-21628", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21628" }, { "cve": "CVE-2022-21702", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21702" }, { "cve": "CVE-2022-2175", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2175" }, { "cve": "CVE-2022-2182", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2182" }, { "cve": "CVE-2022-2183", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2183" }, { "cve": "CVE-2022-2206", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2206" }, { "cve": "CVE-2022-2207", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2207" }, { "cve": "CVE-2022-2208", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2208" }, { "cve": "CVE-2022-2210", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2210" }, { "cve": "CVE-2022-2231", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2231" }, { "cve": "CVE-2022-2256", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2256" }, { "cve": "CVE-2022-2257", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2257" }, { "cve": "CVE-2022-2264", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2264" }, { "cve": "CVE-2022-2284", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2284" }, { "cve": "CVE-2022-2285", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2285" }, { "cve": "CVE-2022-2286", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2286" }, { "cve": "CVE-2022-2287", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2287" }, { "cve": "CVE-2022-22976", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-22976" }, { "cve": "CVE-2022-22978", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-22978" }, { "cve": "CVE-2022-2304", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2304" }, { "cve": "CVE-2022-2318", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2318" }, { "cve": "CVE-2022-23302", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23302" }, { "cve": "CVE-2022-23305", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23305" }, { "cve": "CVE-2022-23307", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23307" }, { "cve": "CVE-2022-2343", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2343" }, { "cve": "CVE-2022-2344", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2344" }, { "cve": "CVE-2022-2345", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2345" }, { "cve": "CVE-2022-23471", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23471" }, { "cve": "CVE-2022-23521", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23521" }, { "cve": "CVE-2022-23772", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23772" }, { "cve": "CVE-2022-23773", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23773" }, { "cve": "CVE-2022-24302", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24302" }, { "cve": "CVE-2022-24329", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24329" }, { "cve": "CVE-2022-24823", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24823" }, { "cve": "CVE-2022-24903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24903" }, { "cve": "CVE-2022-2503", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2503" }, { "cve": "CVE-2022-25147", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25147" }, { "cve": "CVE-2022-25168", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25168" }, { "cve": "CVE-2022-2519", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2519" }, { "cve": "CVE-2022-2520", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2520" }, { "cve": "CVE-2022-2521", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2521" }, { "cve": "CVE-2022-2522", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2522" }, { "cve": "CVE-2022-25647", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25647" }, { "cve": "CVE-2022-2571", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2571" }, { "cve": "CVE-2022-2580", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2580" }, { "cve": "CVE-2022-2581", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2581" }, { "cve": "CVE-2022-25857", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25857" }, { "cve": "CVE-2022-2588", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2588" }, { "cve": "CVE-2022-2598", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2598" }, { "cve": "CVE-2022-26148", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26148" }, { "cve": "CVE-2022-26365", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26365" }, { "cve": "CVE-2022-26373", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26373" }, { "cve": "CVE-2022-2639", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2639" }, { "cve": "CVE-2022-26612", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26612" }, { "cve": "CVE-2022-2663", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2663" }, { "cve": "CVE-2022-27781", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-27781" }, { "cve": "CVE-2022-27782", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-27782" }, { "cve": "CVE-2022-27943", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-27943" }, { "cve": "CVE-2022-2795", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2795" }, { "cve": "CVE-2022-28131", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28131" }, { "cve": "CVE-2022-2816", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2816" }, { "cve": "CVE-2022-2817", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2817" }, { "cve": "CVE-2022-2819", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2819" }, { "cve": "CVE-2022-28327", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28327" }, { "cve": "CVE-2022-2845", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2845" }, { "cve": "CVE-2022-2849", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2849" }, { "cve": "CVE-2022-2862", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2862" }, { "cve": "CVE-2022-2867", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2867" }, { "cve": "CVE-2022-2868", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2868" }, { "cve": "CVE-2022-2869", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2869" }, { "cve": "CVE-2022-28693", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28693" }, { "cve": "CVE-2022-2874", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2874" }, { "cve": "CVE-2022-28748", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28748" }, { "cve": "CVE-2022-2880", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2880" }, { "cve": "CVE-2022-2889", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2889" }, { "cve": "CVE-2022-29162", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29162" }, { "cve": "CVE-2022-29187", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29187" }, { "cve": "CVE-2022-2923", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2923" }, { "cve": "CVE-2022-2946", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2946" }, { "cve": "CVE-2022-29526", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29526" }, { "cve": "CVE-2022-29583", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29583" }, { "cve": "CVE-2022-2964", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2964" }, { "cve": "CVE-2022-2977", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2977" }, { "cve": "CVE-2022-2980", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2980" }, { "cve": "CVE-2022-2982", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2982" }, { "cve": "CVE-2022-29900", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29900" }, { "cve": "CVE-2022-29901", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29901" }, { "cve": "CVE-2022-2991", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2991" }, { "cve": "CVE-2022-3016", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3016" }, { "cve": "CVE-2022-3028", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3028" }, { "cve": "CVE-2022-3037", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3037" }, { "cve": "CVE-2022-30580", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30580" }, { "cve": "CVE-2022-30630", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30630" }, { "cve": "CVE-2022-30631", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30631" }, { "cve": "CVE-2022-30632", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30632" }, { "cve": "CVE-2022-30633", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30633" }, { "cve": "CVE-2022-3099", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3099" }, { "cve": "CVE-2022-31030", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-31030" }, { "cve": "CVE-2022-31159", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-31159" }, { "cve": "CVE-2022-3134", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3134" }, { "cve": "CVE-2022-3153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3153" }, { "cve": "CVE-2022-3169", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3169" }, { "cve": "CVE-2022-31690", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-31690" }, { "cve": "CVE-2022-32148", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32148" }, { "cve": "CVE-2022-32149", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32149" }, { "cve": "CVE-2022-32206", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32206" }, { "cve": "CVE-2022-32208", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32208" }, { "cve": "CVE-2022-32221", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32221" }, { "cve": "CVE-2022-3234", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3234" }, { "cve": "CVE-2022-3235", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3235" }, { "cve": "CVE-2022-3239", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3239" }, { "cve": "CVE-2022-3278", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3278" }, { "cve": "CVE-2022-3296", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3296" }, { "cve": "CVE-2022-3297", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3297" }, { "cve": "CVE-2022-33196", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33196" }, { "cve": "CVE-2022-3324", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3324" }, { "cve": "CVE-2022-3352", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3352" }, { "cve": "CVE-2022-33740", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33740" }, { "cve": "CVE-2022-33741", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33741" }, { "cve": "CVE-2022-33742", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33742" }, { "cve": "CVE-2022-33972", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33972" }, { "cve": "CVE-2022-33981", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33981" }, { "cve": "CVE-2022-34169", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34169" }, { "cve": "CVE-2022-3424", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3424" }, { "cve": "CVE-2022-34266", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34266" }, { "cve": "CVE-2022-34526", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34526" }, { "cve": "CVE-2022-34903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34903" }, { "cve": "CVE-2022-3491", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3491" }, { "cve": "CVE-2022-3515", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3515" }, { "cve": "CVE-2022-3520", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3520" }, { "cve": "CVE-2022-3521", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3521" }, { "cve": "CVE-2022-3524", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3524" }, { "cve": "CVE-2022-35252", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-35252" }, { "cve": "CVE-2022-3542", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3542" }, { "cve": "CVE-2022-3545", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3545" }, { "cve": "CVE-2022-3564", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3564" }, { "cve": "CVE-2022-3565", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3565" }, { "cve": "CVE-2022-3566", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3566" }, { "cve": "CVE-2022-3567", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3567" }, { "cve": "CVE-2022-35737", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-35737" }, { "cve": "CVE-2022-3586", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3586" }, { "cve": "CVE-2022-3591", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3591" }, { "cve": "CVE-2022-3594", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3594" }, { "cve": "CVE-2022-3597", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3597" }, { "cve": "CVE-2022-3599", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3599" }, { "cve": "CVE-2022-36109", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36109" }, { "cve": "CVE-2022-3621", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3621" }, { "cve": "CVE-2022-3626", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3626" }, { "cve": "CVE-2022-3627", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3627" }, { "cve": "CVE-2022-3628", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3628" }, { "cve": "CVE-2022-36280", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36280" }, { "cve": "CVE-2022-3629", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3629" }, { "cve": "CVE-2022-3635", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3635" }, { "cve": "CVE-2022-3643", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3643" }, { "cve": "CVE-2022-36437", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36437" }, { "cve": "CVE-2022-3646", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3646" }, { "cve": "CVE-2022-3649", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3649" }, { "cve": "CVE-2022-36760", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36760" }, { "cve": "CVE-2022-36879", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36879" }, { "cve": "CVE-2022-36946", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36946" }, { "cve": "CVE-2022-3705", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3705" }, { "cve": "CVE-2022-37434", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37434" }, { "cve": "CVE-2022-37436", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37436" }, { "cve": "CVE-2022-37865", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37865" }, { "cve": "CVE-2022-37866", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37866" }, { "cve": "CVE-2022-38090", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38090" }, { "cve": "CVE-2022-38096", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38096" }, { "cve": "CVE-2022-38126", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38126" }, { "cve": "CVE-2022-38127", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38127" }, { "cve": "CVE-2022-38177", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38177" }, { "cve": "CVE-2022-38178", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38178" }, { "cve": "CVE-2022-3821", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3821" }, { "cve": "CVE-2022-38533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38533" }, { "cve": "CVE-2022-38749", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38749" }, { "cve": "CVE-2022-38750", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38750" }, { "cve": "CVE-2022-38751", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38751" }, { "cve": "CVE-2022-38752", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38752" }, { "cve": "CVE-2022-39028", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-39028" }, { "cve": "CVE-2022-3903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3903" }, { "cve": "CVE-2022-39188", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-39188" }, { "cve": "CVE-2022-39399", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-39399" }, { "cve": "CVE-2022-3970", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3970" }, { "cve": "CVE-2022-40149", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40149" }, { "cve": "CVE-2022-40150", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40150" }, { "cve": "CVE-2022-40151", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40151" }, { "cve": "CVE-2022-40152", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40152" }, { "cve": "CVE-2022-40153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40153" }, { "cve": "CVE-2022-40303", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40303" }, { "cve": "CVE-2022-40304", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40304" }, { "cve": "CVE-2022-40307", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40307" }, { "cve": "CVE-2022-40674", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40674" }, { "cve": "CVE-2022-40768", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40768" }, { "cve": "CVE-2022-40899", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40899" }, { "cve": "CVE-2022-4095", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4095" }, { "cve": "CVE-2022-41218", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41218" }, { "cve": "CVE-2022-4129", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4129" }, { "cve": "CVE-2022-4141", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4141" }, { "cve": "CVE-2022-41717", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41717" }, { "cve": "CVE-2022-41721", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41721" }, { "cve": "CVE-2022-41848", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41848" }, { "cve": "CVE-2022-41850", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41850" }, { "cve": "CVE-2022-41854", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41854" }, { "cve": "CVE-2022-41858", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41858" }, { "cve": "CVE-2022-41881", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41881" }, { "cve": "CVE-2022-41903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41903" }, { "cve": "CVE-2022-41915", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41915" }, { "cve": "CVE-2022-41966", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41966" }, { "cve": "CVE-2022-41974", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41974" }, { "cve": "CVE-2022-42003", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42003" }, { "cve": "CVE-2022-42004", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42004" }, { "cve": "CVE-2022-42010", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42010" }, { "cve": "CVE-2022-42011", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42011" }, { "cve": "CVE-2022-42012", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42012" }, { "cve": "CVE-2022-42328", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42328" }, { "cve": "CVE-2022-42329", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42329" }, { "cve": "CVE-2022-42703", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42703" }, { "cve": "CVE-2022-42889", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42889" }, { "cve": "CVE-2022-42895", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42895" }, { "cve": "CVE-2022-42896", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42896" }, { "cve": "CVE-2022-42898", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42898" }, { "cve": "CVE-2022-4292", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4292" }, { "cve": "CVE-2022-4293", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4293" }, { "cve": "CVE-2022-42969", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42969" }, { "cve": "CVE-2022-4304", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4304" }, { "cve": "CVE-2022-43552", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43552" }, { "cve": "CVE-2022-43680", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43680" }, { "cve": "CVE-2022-43750", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43750" }, { "cve": "CVE-2022-4378", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4378" }, { "cve": "CVE-2022-43945", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43945" }, { "cve": "CVE-2022-43995", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43995" }, { "cve": "CVE-2022-4415", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4415" }, { "cve": "CVE-2022-4450", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4450" }, { "cve": "CVE-2022-44638", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-44638" }, { "cve": "CVE-2022-45061", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45061" }, { "cve": "CVE-2022-45688", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45688" }, { "cve": "CVE-2022-45884", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45884" }, { "cve": "CVE-2022-45885", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45885" }, { "cve": "CVE-2022-45886", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45886" }, { "cve": "CVE-2022-45887", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45887" }, { "cve": "CVE-2022-45919", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45919" }, { "cve": "CVE-2022-45934", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45934" }, { "cve": "CVE-2022-45939", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45939" }, { "cve": "CVE-2022-4662", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4662" }, { "cve": "CVE-2022-46751", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-46751" }, { "cve": "CVE-2022-46908", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-46908" }, { "cve": "CVE-2022-47629", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-47629" }, { "cve": "CVE-2022-47929", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-47929" }, { "cve": "CVE-2022-48281", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-48281" }, { "cve": "CVE-2022-48337", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-48337" }, { "cve": "CVE-2022-48339", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-48339" }, { "cve": "CVE-2023-0045", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0045" }, { "cve": "CVE-2023-0049", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0049" }, { "cve": "CVE-2023-0051", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0051" }, { "cve": "CVE-2023-0054", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0054" }, { "cve": "CVE-2023-0215", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0215" }, { "cve": "CVE-2023-0286", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0286" }, { "cve": "CVE-2023-0288", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0288" }, { "cve": "CVE-2023-0433", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0433" }, { "cve": "CVE-2023-0464", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0464" }, { "cve": "CVE-2023-0465", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0465" }, { "cve": "CVE-2023-0466", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0466" }, { "cve": "CVE-2023-0512", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0512" }, { "cve": "CVE-2023-0590", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0590" }, { "cve": "CVE-2023-0597", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0597" }, { "cve": "CVE-2023-0833", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0833" }, { "cve": "CVE-2023-1076", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1076" }, { "cve": "CVE-2023-1095", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1095" }, { "cve": "CVE-2023-1118", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1118" }, { "cve": "CVE-2023-1127", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1127" }, { "cve": "CVE-2023-1170", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1170" }, { "cve": "CVE-2023-1175", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1175" }, { "cve": "CVE-2023-1370", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1370" }, { "cve": "CVE-2023-1380", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1380" }, { "cve": "CVE-2023-1390", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1390" }, { "cve": "CVE-2023-1436", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1436" }, { "cve": "CVE-2023-1513", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1513" }, { "cve": "CVE-2023-1611", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1611" }, { "cve": "CVE-2023-1670", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1670" }, { "cve": "CVE-2023-1855", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1855" }, { "cve": "CVE-2023-1989", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1989" }, { "cve": "CVE-2023-1990", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1990" }, { "cve": "CVE-2023-1998", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1998" }, { "cve": "CVE-2023-20862", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-20862" }, { "cve": "CVE-2023-2124", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2124" }, { "cve": "CVE-2023-2162", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2162" }, { "cve": "CVE-2023-2176", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2176" }, { "cve": "CVE-2023-21830", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21830" }, { "cve": "CVE-2023-21835", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21835" }, { "cve": "CVE-2023-21843", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21843" }, { "cve": "CVE-2023-21930", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21930" }, { "cve": "CVE-2023-21937", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21937" }, { "cve": "CVE-2023-21938", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21938" }, { "cve": "CVE-2023-21939", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21939" }, { "cve": "CVE-2023-2194", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2194" }, { "cve": "CVE-2023-21954", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21954" }, { "cve": "CVE-2023-21967", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21967" }, { "cve": "CVE-2023-21968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21968" }, { "cve": "CVE-2023-22490", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-22490" }, { "cve": "CVE-2023-2253", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2253" }, { "cve": "CVE-2023-22809", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-22809" }, { "cve": "CVE-2023-23454", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23454" }, { "cve": "CVE-2023-23455", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23455" }, { "cve": "CVE-2023-23559", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23559" }, { "cve": "CVE-2023-23916", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23916" }, { "cve": "CVE-2023-23946", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23946" }, { "cve": "CVE-2023-24329", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24329" }, { "cve": "CVE-2023-24532", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24532" }, { "cve": "CVE-2023-24534", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24534" }, { "cve": "CVE-2023-2483", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2483" }, { "cve": "CVE-2023-24998", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24998" }, { "cve": "CVE-2023-2513", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2513" }, { "cve": "CVE-2023-25193", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25193" }, { "cve": "CVE-2023-25652", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25652" }, { "cve": "CVE-2023-25690", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25690" }, { "cve": "CVE-2023-25809", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25809" }, { "cve": "CVE-2023-25815", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25815" }, { "cve": "CVE-2023-26048", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26048" }, { "cve": "CVE-2023-26049", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26049" }, { "cve": "CVE-2023-2650", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2650" }, { "cve": "CVE-2023-26545", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26545" }, { "cve": "CVE-2023-26604", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26604" }, { "cve": "CVE-2023-27533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27533" }, { "cve": "CVE-2023-27534", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27534" }, { "cve": "CVE-2023-27535", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27535" }, { "cve": "CVE-2023-27536", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27536" }, { "cve": "CVE-2023-27538", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27538" }, { "cve": "CVE-2023-27561", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27561" }, { "cve": "CVE-2023-2828", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2828" }, { "cve": "CVE-2023-28320", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28320" }, { "cve": "CVE-2023-28321", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28321" }, { "cve": "CVE-2023-28322", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28322" }, { "cve": "CVE-2023-28328", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28328" }, { "cve": "CVE-2023-28464", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28464" }, { "cve": "CVE-2023-28486", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28486" }, { "cve": "CVE-2023-28487", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28487" }, { "cve": "CVE-2023-28642", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28642" }, { "cve": "CVE-2023-28772", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28772" }, { "cve": "CVE-2023-28840", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28840" }, { "cve": "CVE-2023-28841", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28841" }, { "cve": "CVE-2023-28842", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28842" }, { "cve": "CVE-2023-29007", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29007" }, { "cve": "CVE-2023-29383", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29383" }, { "cve": "CVE-2023-29402", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29402" }, { "cve": "CVE-2023-29406", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29406" }, { "cve": "CVE-2023-29409", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29409" }, { "cve": "CVE-2023-2976", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2976" }, { "cve": "CVE-2023-30630", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-30630" }, { "cve": "CVE-2023-30772", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-30772" }, { "cve": "CVE-2023-31084", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-31084" }, { "cve": "CVE-2023-3138", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-3138" }, { "cve": "CVE-2023-31436", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-31436" }, { "cve": "CVE-2023-31484", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-31484" }, { "cve": "CVE-2023-32269", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-32269" }, { "cve": "CVE-2023-32697", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-32697" }, { "cve": "CVE-2023-33264", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-33264" }, { "cve": "CVE-2023-34034", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34034" }, { "cve": "CVE-2023-34035", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34035" }, { "cve": "CVE-2023-34453", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34453" }, { "cve": "CVE-2023-34454", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34454" }, { "cve": "CVE-2023-34455", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34455" }, { "cve": "CVE-2023-34462", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34462" }, { "cve": "CVE-2023-35116", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-35116" }, { "cve": "CVE-2023-3635", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-3635" }, { "cve": "CVE-2023-36479", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-36479" }, { "cve": "CVE-2023-39533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-39533" }, { "cve": "CVE-2023-40167", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-40167" }, { "cve": "CVE-2023-40217", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-40217" }, { "cve": "CVE-2023-41105", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-41105" }, { "cve": "CVE-2023-41900", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-41900" }, { "cve": "CVE-2023-43642", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-43642" }, { "cve": "CVE-2023-43804", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-43804" }, { "cve": "CVE-2023-44487", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-44487" }, { "cve": "CVE-2023-45803", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-45803" }, { "cve": "CVE-2024-21626", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2024-21626" } ] }
WID-SEC-W-2023-1032
Vulnerability from csaf_certbund
Published
2023-04-18 22:00
Modified
2023-04-18 22:00
Summary
Oracle PeopleSoft: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Oracle PeopleSoft ist eine ERP Anwendung.
Angriff
Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Oracle PeopleSoft ausnutzen, um die Vertraulichkeit, Integrität und Verfügbarkeit zu gefährden.
Betroffene Betriebssysteme
- UNIX
- Linux
- Windows
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Oracle PeopleSoft ist eine ERP Anwendung.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Oracle PeopleSoft ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-1032 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1032.json" }, { "category": "self", "summary": "WID-SEC-2023-1032 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1032" }, { "category": "external", "summary": "Oracle Critical Patch Update Advisory - April 2023 - Appendix Oracle PeopleSoft vom 2023-04-18", "url": "https://www.oracle.com/security-alerts/cpuapr2023.html#AppendixPS" } ], "source_lang": "en-US", "title": "Oracle PeopleSoft: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-04-18T22:00:00.000+00:00", "generator": { "date": "2024-02-15T17:24:58.473+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-1032", "initial_release_date": "2023-04-18T22:00:00.000+00:00", "revision_history": [ { "date": "2023-04-18T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Oracle PeopleSoft 8.58", "product": { "name": "Oracle PeopleSoft 8.58", "product_id": "T019029", "product_identification_helper": { "cpe": "cpe:/a:oracle:peoplesoft:8.58" } } }, { "category": "product_name", "name": "Oracle PeopleSoft 9.2", "product": { "name": "Oracle PeopleSoft 9.2", "product_id": "T019030", "product_identification_helper": { "cpe": "cpe:/a:oracle:peoplesoft:9.2" } } }, { "category": "product_name", "name": "Oracle PeopleSoft 8.59", "product": { "name": "Oracle PeopleSoft 8.59", "product_id": "T019905", "product_identification_helper": { "cpe": "cpe:/a:oracle:peoplesoft:8.59" } } }, { "category": "product_name", "name": "Oracle PeopleSoft 8.60", "product": { "name": "Oracle PeopleSoft 8.60", "product_id": "T025008", "product_identification_helper": { "cpe": "cpe:/a:oracle:peoplesoft:8.60" } } } ], "category": "product_name", "name": "PeopleSoft" } ], "category": "vendor", "name": "Oracle" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-21992", "notes": [ { "category": "description", "text": "In Oracle PeopleSoft existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T019029", "T025008", "T019030", "T019905" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2023-21992" }, { "cve": "CVE-2023-21981", "notes": [ { "category": "description", "text": "In Oracle PeopleSoft existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T019029", "T025008", "T019030", "T019905" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2023-21981" }, { "cve": "CVE-2023-21916", "notes": [ { "category": "description", "text": "In Oracle PeopleSoft existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T019029", "T025008", "T019030", "T019905" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2023-21916" }, { "cve": "CVE-2022-45685", "notes": [ { "category": "description", "text": "In Oracle PeopleSoft existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T019029", "T025008", "T019030", "T019905" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-45685" }, { "cve": "CVE-2022-45047", "notes": [ { "category": "description", "text": "In Oracle PeopleSoft existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T019029", "T025008", "T019030", "T019905" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-45047" }, { "cve": "CVE-2022-41881", "notes": [ { "category": "description", "text": "In Oracle PeopleSoft existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T019029", "T025008", "T019030", "T019905" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-41881" }, { "cve": "CVE-2022-36033", "notes": [ { "category": "description", "text": "In Oracle PeopleSoft existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T019029", "T025008", "T019030", "T019905" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-36033" }, { "cve": "CVE-2022-34169", "notes": [ { "category": "description", "text": "In Oracle PeopleSoft existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T019029", "T025008", "T019030", "T019905" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-34169" }, { "cve": "CVE-2021-37533", "notes": [ { "category": "description", "text": "In Oracle PeopleSoft existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T019029", "T025008", "T019030", "T019905" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2021-37533" }, { "cve": "CVE-2020-14343", "notes": [ { "category": "description", "text": "In Oracle PeopleSoft existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T019029", "T025008", "T019030", "T019905" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2020-14343" } ] }
wid-sec-w-2022-0746
Vulnerability from csaf_certbund
Published
2022-07-19 22:00
Modified
2024-06-06 22:00
Summary
OpenJDK: Mehrere Schwachstellen ermöglichen Codeausführung
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
OpenJDK ist eine Java Umgebung, die unter der GPLv2 veröffentlicht wird.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in OpenJDK ausnutzen, um beliebigen Programmcode auszuführen, Sicherheitsvorkehrungen zu umgehen oder Dateien zu manipulieren.
Betroffene Betriebssysteme
- Linux
- MacOS X
- Sonstiges
- UNIX
- Windows
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "OpenJDK ist eine Java Umgebung, die unter der GPLv2 ver\u00f6ffentlicht wird.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in OpenJDK ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder Dateien zu manipulieren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- MacOS X\n- Sonstiges\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-0746 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0746.json" }, { "category": "self", "summary": "WID-SEC-2022-0746 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0746" }, { "category": "external", "summary": "Red Hat Bugzilla - Bug 2108540 vom 2022-07-19", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "Red Hat Bugzilla - Bug 2108543 vom 2022-07-19", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "Red Hat Bugzilla - Bug 2108547 vom 2022-07-19", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108547" }, { "category": "external", "summary": "Red Hat Bugzilla - Bug 2108554 vom 2022-07-19", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5685 vom 2022-07-22", "url": "https://access.redhat.com/errata/RHSA-2022:5685" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5684 vom 2022-07-22", "url": "https://access.redhat.com/errata/RHSA-2022:5684" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5681 vom 2022-07-22", "url": "https://access.redhat.com/errata/RHSA-2022:5681" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-111 vom 2022-07-21", "url": "https://alas.aws.amazon.com/AL2022/ALAS-2022-111.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-5687 vom 2022-07-22", "url": "http://linux.oracle.com/errata/ELSA-2022-5687.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-112 vom 2022-07-21", "url": "https://alas.aws.amazon.com/AL2022/ALAS-2022-112.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-113 vom 2022-07-21", "url": "https://alas.aws.amazon.com/AL2022/ALAS-2022-113.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-5683 vom 2022-07-22", "url": "http://linux.oracle.com/errata/ELSA-2022-5683.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5687 vom 2022-07-22", "url": "https://access.redhat.com/errata/RHSA-2022:5687" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5683 vom 2022-07-22", "url": "https://access.redhat.com/errata/RHSA-2022:5683" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2CORRETTO8-2022-003 vom 2022-07-21", "url": "https://alas.aws.amazon.com/AL2/ALASCORRETTO8-2022-003.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-1822 vom 2022-07-21", "url": "https://alas.aws.amazon.com/AL2/ALAS-2022-1822.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-5188 vom 2022-07-22", "url": "https://lists.debian.org/debian-security-announce/2022/msg00157.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-5695 vom 2022-07-26", "url": "http://linux.oracle.com/errata/ELSA-2022-5695.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-5696 vom 2022-07-26", "url": "http://linux.oracle.com/errata/ELSA-2022-5696.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-5698 vom 2022-07-26", "url": "http://linux.oracle.com/errata/ELSA-2022-5698.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5696 vom 2022-07-26", "url": "https://access.redhat.com/errata/RHSA-2022:5696" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5697 vom 2022-07-26", "url": "https://access.redhat.com/errata/RHSA-2022:5697" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5698 vom 2022-07-26", "url": "https://access.redhat.com/errata/RHSA-2022:5698" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5700 vom 2022-07-26", "url": "https://access.redhat.com/errata/RHSA-2022:5700" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5701 vom 2022-07-26", "url": "https://access.redhat.com/errata/RHSA-2022:5701" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5695 vom 2022-07-26", "url": "https://access.redhat.com/errata/RHSA-2022:5695" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5709 vom 2022-07-26", "url": "https://access.redhat.com/errata/RHSA-2022:5709" }, { "category": "external", "summary": "Debian Security Advisory DSA-5192 vom 2022-07-26", "url": "https://lists.debian.org/debian-security-announce/2022/msg00161.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5726 vom 2022-07-27", "url": "https://access.redhat.com/errata/RHSA-2022:5726" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-5709 vom 2022-07-26", "url": "http://linux.oracle.com/errata/ELSA-2022-5709.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-5726 vom 2022-07-27", "url": "http://linux.oracle.com/errata/ELSA-2022-5726.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5736 vom 2022-07-28", "url": "https://access.redhat.com/errata/RHSA-2022:5736" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-5736 vom 2022-07-28", "url": "http://linux.oracle.com/errata/ELSA-2022-5736.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5756 vom 2022-07-29", "url": "https://access.redhat.com/errata/RHSA-2022:5756" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5757 vom 2022-07-29", "url": "https://access.redhat.com/errata/RHSA-2022:5757" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5755 vom 2022-07-29", "url": "https://access.redhat.com/errata/RHSA-2022:5755" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5754 vom 2022-07-28", "url": "https://access.redhat.com/errata/RHSA-2022:5754" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5753 vom 2022-07-28", "url": "https://access.redhat.com/errata/RHSA-2022:5753" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5758 vom 2022-07-29", "url": "https://access.redhat.com/errata/RHSA-2022:5758" }, { "category": "external", "summary": "AVAYA Security Advisory ASA-2022-107 vom 2022-07-28", "url": "https://downloads.avaya.com/css/P8/documents/101083044" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2610-1 vom 2022-08-01", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011733.html" }, { "category": "external", "summary": "CentOS Security Advisory CESA-2022:5698 vom 2022-08-02", "url": "https://lists.centos.org/pipermail/centos-announce/2022-August/073599.html" }, { "category": "external", "summary": "CentOS Security Advisory CESA-2022:5687 vom 2022-08-02", "url": "https://lists.centos.org/pipermail/centos-announce/2022-August/073598.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-121 vom 2022-08-05", "url": "https://alas.aws.amazon.com/AL2022/ALAS-2022-121.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2707-1 vom 2022-08-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011827.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2819-1 vom 2022-08-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011920.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2856-1 vom 2022-08-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011952.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:3152-1 vom 2022-09-07", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-September/012164.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2-2022-1836 vom 2022-09-15", "url": "https://alas.aws.amazon.com/AL2/ALAS-2022-1836.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2JAVA-OPENJDK11-2022-002 vom 2022-09-15", "url": "https://alas.aws.amazon.com/AL2/ALASJAVA-OPENJDK11-2022-002.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:3708 vom 2024-06-06", "url": "https://access.redhat.com/errata/RHSA-2024:3708" } ], "source_lang": "en-US", "title": "OpenJDK: Mehrere Schwachstellen erm\u00f6glichen Codeausf\u00fchrung", "tracking": { "current_release_date": "2024-06-06T22:00:00.000+00:00", "generator": { "date": "2024-06-07T08:09:09.163+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-0746", "initial_release_date": "2022-07-19T22:00:00.000+00:00", "revision_history": [ { "date": "2022-07-19T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-07-21T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Red Hat, Amazon und Oracle Linux aufgenommen" }, { "date": "2022-07-24T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2022-07-25T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen" }, { "date": "2022-07-26T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Debian, Red Hat, Fedora und Oracle Linux aufgenommen" }, { "date": "2022-07-27T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen" }, { "date": "2022-07-28T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-07-31T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von AVAYA aufgenommen" }, { "date": "2022-08-01T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-08-03T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von CentOS aufgenommen" }, { "date": "2022-08-04T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2022-08-09T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-08-16T22:00:00.000+00:00", "number": "13", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-08-21T22:00:00.000+00:00", "number": "14", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-09-07T22:00:00.000+00:00", "number": "15", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-09-14T22:00:00.000+00:00", "number": "16", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2024-06-06T22:00:00.000+00:00", "number": "17", "summary": "Neue Updates von Red Hat aufgenommen" } ], "status": "final", "version": "17" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Avaya Aura Application Enablement Services", "product": { "name": "Avaya Aura Application Enablement Services", "product_id": "T015516", "product_identification_helper": { "cpe": "cpe:/a:avaya:aura_application_enablement_services:-" } } }, { "category": "product_name", "name": "Avaya Aura Communication Manager", "product": { "name": "Avaya Aura Communication Manager", "product_id": "T015126", "product_identification_helper": { "cpe": "cpe:/a:avaya:communication_manager:-" } } }, { "category": "product_name", "name": "Avaya Aura Experience Portal", "product": { "name": "Avaya Aura Experience Portal", "product_id": "T015519", "product_identification_helper": { "cpe": "cpe:/a:avaya:aura_experience_portal:-" } } }, { "category": "product_name", "name": "Avaya Aura Session Manager", "product": { "name": "Avaya Aura Session Manager", "product_id": "T015127", "product_identification_helper": { "cpe": "cpe:/a:avaya:session_manager:-" } } }, { "category": "product_name", "name": "Avaya Aura System Manager", "product": { "name": "Avaya Aura System Manager", "product_id": "T015518", "product_identification_helper": { "cpe": "cpe:/a:avaya:aura_system_manager:-" } } } ], "category": "vendor", "name": "Avaya" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Open Source CentOS", "product": { "name": "Open Source CentOS", "product_id": "1727", "product_identification_helper": { "cpe": "cpe:/o:centos:centos:-" } } }, { "category": "product_name", "name": "Open Source OpenJDK", "product": { "name": "Open Source OpenJDK", "product_id": "185975", "product_identification_helper": { "cpe": "cpe:/a:oracle:openjdk:1.6.0" } } } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } }, { "branches": [ { "category": "product_version", "name": "Camel for Spring Boot 1", "product": { "name": "Red Hat Integration Camel for Spring Boot 1", "product_id": "T035240", "product_identification_helper": { "cpe": "cpe:/a:redhat:integration:camel_for_spring_boot_1" } } } ], "category": "product_name", "name": "Integration" } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21540", "notes": [ { "category": "description", "text": "In OpenJDK existieren mehrere Schwachstellen. Diese sind auf Fehler in \"Oracle Java\" zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "185975", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T035240", "T004914", "2951", "T002207", "398363", "1727" ] }, "release_date": "2022-07-19T22:00:00Z", "title": "CVE-2022-21540" }, { "cve": "CVE-2022-21541", "notes": [ { "category": "description", "text": "In OpenJDK existieren mehrere Schwachstellen. Diese sind auf Fehler in \"Oracle Java\" zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "185975", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T035240", "T004914", "2951", "T002207", "398363", "1727" ] }, "release_date": "2022-07-19T22:00:00Z", "title": "CVE-2022-21541" }, { "cve": "CVE-2022-21549", "notes": [ { "category": "description", "text": "In OpenJDK existieren mehrere Schwachstellen. Diese sind auf Fehler in \"Oracle Java\" zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "185975", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T035240", "T004914", "2951", "T002207", "398363", "1727" ] }, "release_date": "2022-07-19T22:00:00Z", "title": "CVE-2022-21549" }, { "cve": "CVE-2022-34169", "notes": [ { "category": "description", "text": "In OpenJDK existieren mehrere Schwachstellen. Diese sind auf Fehler in \"Oracle Java\" zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "185975", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T035240", "T004914", "2951", "T002207", "398363", "1727" ] }, "release_date": "2022-07-19T22:00:00Z", "title": "CVE-2022-34169" } ] }
wid-sec-w-2022-0759
Vulnerability from csaf_certbund
Published
2022-07-19 22:00
Modified
2024-06-10 22:00
Summary
Oracle Java SE: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Die Java Platform, Standard Edition (SE) ist eine Sammlung von Java-APIs (JDK) und der Java Laufzeit Umgebung (JRE).
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Oracle Java SE ausnutzen, um die Vertraulichkeit, Integrität und Verfügbarkeit zu gefährden.
Betroffene Betriebssysteme
- Linux
- MacOS X
- Sonstiges
- UNIX
- Windows
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Die Java Platform, Standard Edition (SE) ist eine Sammlung von Java-APIs (JDK) und der Java Laufzeit Umgebung (JRE).", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Oracle Java SE ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- MacOS X\n- Sonstiges\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-0759 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0759.json" }, { "category": "self", "summary": "WID-SEC-2022-0759 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0759" }, { "category": "external", "summary": "Menu - Appendix Oracle Java SE vom 2022-07-19", "url": "https://www.oracle.com/security-alerts/cpujul2022.html#AppendixJAVA" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-1824 vom 2022-07-21", "url": "https://alas.aws.amazon.com/AL2/ALAS-2022-1824.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-1823 vom 2022-07-21", "url": "https://alas.aws.amazon.com/AL2/ALAS-2022-1823.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-5683 vom 2022-07-22", "url": "http://linux.oracle.com/errata/ELSA-2022-5683.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-111 vom 2022-07-21", "url": "https://alas.aws.amazon.com/AL2022/ALAS-2022-111.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-112 vom 2022-07-21", "url": "https://alas.aws.amazon.com/AL2022/ALAS-2022-112.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-113 vom 2022-07-21", "url": "https://alas.aws.amazon.com/AL2022/ALAS-2022-113.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-5687 vom 2022-07-22", "url": "http://linux.oracle.com/errata/ELSA-2022-5687.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-1822 vom 2022-07-21", "url": "https://alas.aws.amazon.com/AL2/ALAS-2022-1822.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2CORRETTO8-2022-003 vom 2022-07-21", "url": "https://alas.aws.amazon.com/AL2/ALASCORRETTO8-2022-003.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-5696 vom 2022-07-26", "url": "https://linux.oracle.com/errata/ELSA-2022-5696.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-5698 vom 2022-07-25", "url": "https://linux.oracle.com/errata/ELSA-2022-5698.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2660-1 vom 2022-08-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011767.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-120 vom 2022-08-05", "url": "https://alas.aws.amazon.com/AL2022/ALAS-2022-120.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-119 vom 2022-08-05", "url": "https://alas.aws.amazon.com/AL2022/ALAS-2022-119.html" }, { "category": "external", "summary": "Hitachi Vulnerability Information HITACHI-SEC-2022-127 vom 2022-08-09", "url": "https://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/hitachi-sec-2022-127/index.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2898-1 vom 2022-08-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011996.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2899-1 vom 2022-08-26", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011995.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2949-1 vom 2022-08-31", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-August/012014.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:3092-1 vom 2022-09-06", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-September/012103.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-5227 vom 2022-09-07", "url": "https://lists.debian.org/debian-security-announce/2022/msg00196.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-1633 vom 2022-09-12", "url": "https://alas.aws.amazon.com/ALAS-2022-1633.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-1835 vom 2022-09-15", "url": "https://alas.aws.amazon.com/AL2/ALAS-2022-1835.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:4166-1 vom 2022-11-22", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-November/013066.html" }, { "category": "external", "summary": "Juniper Security Advisory JSA70185 vom 2023-01-12", "url": "https://supportportal.juniper.net/s/article/2023-01-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-22-3R1-release?language=en_US" }, { "category": "external", "summary": "IBM Security Bulletin 6856221 vom 2023-01-18", "url": "https://www.ibm.com/support/pages/node/6856221" }, { "category": "external", "summary": "IBM Security Bulletin 7014699 vom 2023-07-26", "url": "https://www.ibm.com/support/pages/node/7014699" }, { "category": "external", "summary": "IBM Security Bulletin 7140420 vom 2024-03-13", "url": "https://www.ibm.com/support/pages/node/7140420" }, { "category": "external", "summary": "Gentoo Linux Security Advisory GLSA-202405-16 vom 2024-05-05", "url": "https://security.gentoo.org/glsa/202405-16" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:3780 vom 2024-06-10", "url": "https://access.redhat.com/errata/RHSA-2024:3780" } ], "source_lang": "en-US", "title": "Oracle Java SE: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-06-10T22:00:00.000+00:00", "generator": { "date": "2024-06-11T08:07:52.212+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-0759", "initial_release_date": "2022-07-19T22:00:00.000+00:00", "revision_history": [ { "date": "2022-07-19T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-07-20T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2022-07-21T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Oracle Linux und Amazon aufgenommen" }, { "date": "2022-07-25T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2022-08-03T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-08-04T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2022-08-08T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von HITACHI aufgenommen" }, { "date": "2022-08-25T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-08-31T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-09-06T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-09-07T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2022-09-12T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2022-09-14T22:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2022-11-22T23:00:00.000+00:00", "number": "14", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-01-11T23:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Juniper aufgenommen" }, { "date": "2023-01-18T23:00:00.000+00:00", "number": "16", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2023-07-26T22:00:00.000+00:00", "number": "17", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-03-12T23:00:00.000+00:00", "number": "18", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-05-05T22:00:00.000+00:00", "number": "19", "summary": "Neue Updates von Gentoo aufgenommen" }, { "date": "2024-06-10T22:00:00.000+00:00", "number": "20", "summary": "Neue Updates von Red Hat aufgenommen" } ], "status": "final", "version": "20" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Gentoo Linux", "product": { "name": "Gentoo Linux", "product_id": "T012167", "product_identification_helper": { "cpe": "cpe:/o:gentoo:linux:-" } } } ], "category": "vendor", "name": "Gentoo" }, { "branches": [ { "category": "product_name", "name": "Hitachi Command Suite", "product": { "name": "Hitachi Command Suite", "product_id": "T010951", "product_identification_helper": { "cpe": "cpe:/a:hitachi:command_suite:-" } } }, { "category": "product_name", "name": "Hitachi Configuration Manager", "product": { "name": "Hitachi Configuration Manager", "product_id": "T020304", "product_identification_helper": { "cpe": "cpe:/a:hitachi:configuration_manager:-" } } }, { "category": "product_name", "name": "Hitachi Ops Center", "product": { "name": "Hitachi Ops Center", "product_id": "T017562", "product_identification_helper": { "cpe": "cpe:/a:hitachi:ops_center:-" } } } ], "category": "vendor", "name": "Hitachi" }, { "branches": [ { "category": "product_name", "name": "IBM InfoSphere Guardium", "product": { "name": "IBM InfoSphere Guardium", "product_id": "T002366", "product_identification_helper": { "cpe": "cpe:/a:ibm:infosphere_guardium:-" } } }, { "branches": [ { "category": "product_version", "name": "7.5", "product": { "name": "IBM QRadar SIEM 7.5", "product_id": "T022954", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:7.5" } } } ], "category": "product_name", "name": "QRadar SIEM" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "category": "product_name", "name": "Juniper Junos Space", "product": { "name": "Juniper Junos Space", "product_id": "T003343", "product_identification_helper": { "cpe": "cpe:/a:juniper:junos_space:-" } } } ], "category": "vendor", "name": "Juniper" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "11.0.15.1", "product": { "name": "Oracle Java SE 11.0.15.1", "product_id": "T023943", "product_identification_helper": { "cpe": "cpe:/a:oracle:java_se:11.0.15.1" } } }, { "category": "product_version", "name": "17.0.3.1", "product": { "name": "Oracle Java SE 17.0.3.1", "product_id": "T023944", "product_identification_helper": { "cpe": "cpe:/a:oracle:java_se:17.0.3.1" } } }, { "category": "product_version", "name": "21.3.2", "product": { "name": "Oracle Java SE 21.3.2", "product_id": "T023945", "product_identification_helper": { "cpe": "cpe:/a:oracle:java_se:21.3.2" } } }, { "category": "product_version", "name": "22.1.0", "product": { "name": "Oracle Java SE 22.1.0", "product_id": "T023946", "product_identification_helper": { "cpe": "cpe:/a:oracle:java_se:22.1.0" } } }, { "category": "product_version", "name": "7u343", "product": { "name": "Oracle Java SE 7u343", "product_id": "T023985", "product_identification_helper": { "cpe": "cpe:/a:oracle:java_se:7u343" } } }, { "category": "product_version", "name": "8u333", "product": { "name": "Oracle Java SE 8u333", "product_id": "T023986", "product_identification_helper": { "cpe": "cpe:/a:oracle:java_se:8u333" } } }, { "category": "product_version", "name": "18.0.1.1", "product": { "name": "Oracle Java SE 18.0.1.1", "product_id": "T023987", "product_identification_helper": { "cpe": "cpe:/a:oracle:java_se:18.0.1.1" } } }, { "category": "product_version", "name": "Oracle GraalVM Enterprise Edition: 21.3.2", "product": { "name": "Oracle Java SE Oracle GraalVM Enterprise Edition: 21.3.2", "product_id": "T023989", "product_identification_helper": { "cpe": "cpe:/a:oracle:java_se:oracle_graalvm_enterprise_edition_21.3.2" } } }, { "category": "product_version", "name": "Oracle GraalVM Enterprise Edition: 20.3.6", "product": { "name": "Oracle Java SE Oracle GraalVM Enterprise Edition: 20.3.6", "product_id": "T023990", "product_identification_helper": { "cpe": "cpe:/a:oracle:java_se:oracle_graalvm_enterprise_edition_20.3.6" } } } ], "category": "product_name", "name": "Java SE" }, { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21540", "notes": [ { "category": "description", "text": "In Oracle Java SE existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"LOW\" f\u00fcr \"Confidentiality\", sowie \"HIGH\" f\u00fcr \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "67646", "T010951", "T012167", "T004914", "T017562", "T022954", "T023944", "T023945", "T023989", "T023946", "2951", "T002207", "T023985", "T020304", "T023986", "T023943", "T023987", "T002366", "398363", "T023990" ] }, "release_date": "2022-07-19T22:00:00Z", "title": "CVE-2022-21540" }, { "cve": "CVE-2022-21541", "notes": [ { "category": "description", "text": "In Oracle Java SE existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"LOW\" f\u00fcr \"Confidentiality\", sowie \"HIGH\" f\u00fcr \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "67646", "T010951", "T012167", "T004914", "T017562", "T022954", "T023944", "T023945", "T023989", "T023946", "2951", "T002207", "T023985", "T020304", "T023986", "T023943", "T023987", "T002366", "398363", "T023990" ] }, "release_date": "2022-07-19T22:00:00Z", "title": "CVE-2022-21541" }, { "cve": "CVE-2022-21549", "notes": [ { "category": "description", "text": "In Oracle Java SE existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"LOW\" f\u00fcr \"Confidentiality\", sowie \"HIGH\" f\u00fcr \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "67646", "T010951", "T012167", "T004914", "T017562", "T022954", "T023944", "T023945", "T023989", "T023946", "2951", "T002207", "T023985", "T020304", "T023986", "T023943", "T023987", "T002366", "398363", "T023990" ] }, "release_date": "2022-07-19T22:00:00Z", "title": "CVE-2022-21549" }, { "cve": "CVE-2022-25647", "notes": [ { "category": "description", "text": "In Oracle Java SE existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"LOW\" f\u00fcr \"Confidentiality\", sowie \"HIGH\" f\u00fcr \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "67646", "T010951", "T012167", "T004914", "T017562", "T022954", "T023944", "T023945", "T023989", "T023946", "2951", "T002207", "T023985", "T020304", "T023986", "T023943", "T023987", "T002366", "398363", "T023990" ] }, "release_date": "2022-07-19T22:00:00Z", "title": "CVE-2022-25647" }, { "cve": "CVE-2022-34169", "notes": [ { "category": "description", "text": "In Oracle Java SE existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"LOW\" f\u00fcr \"Confidentiality\", sowie \"HIGH\" f\u00fcr \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T003343", "67646", "T010951", "T012167", "T004914", "T017562", "T022954", "T023944", "T023945", "T023989", "T023946", "2951", "T002207", "T023985", "T020304", "T023986", "T023943", "T023987", "T002366", "398363", "T023990" ] }, "release_date": "2022-07-19T22:00:00Z", "title": "CVE-2022-34169" } ] }
WID-SEC-W-2022-0746
Vulnerability from csaf_certbund
Published
2022-07-19 22:00
Modified
2024-06-06 22:00
Summary
OpenJDK: Mehrere Schwachstellen ermöglichen Codeausführung
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
OpenJDK ist eine Java Umgebung, die unter der GPLv2 veröffentlicht wird.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in OpenJDK ausnutzen, um beliebigen Programmcode auszuführen, Sicherheitsvorkehrungen zu umgehen oder Dateien zu manipulieren.
Betroffene Betriebssysteme
- Linux
- MacOS X
- Sonstiges
- UNIX
- Windows
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "OpenJDK ist eine Java Umgebung, die unter der GPLv2 ver\u00f6ffentlicht wird.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in OpenJDK ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder Dateien zu manipulieren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- MacOS X\n- Sonstiges\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-0746 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0746.json" }, { "category": "self", "summary": "WID-SEC-2022-0746 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0746" }, { "category": "external", "summary": "Red Hat Bugzilla - Bug 2108540 vom 2022-07-19", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108540" }, { "category": "external", "summary": "Red Hat Bugzilla - Bug 2108543 vom 2022-07-19", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108543" }, { "category": "external", "summary": "Red Hat Bugzilla - Bug 2108547 vom 2022-07-19", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108547" }, { "category": "external", "summary": "Red Hat Bugzilla - Bug 2108554 vom 2022-07-19", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108554" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5685 vom 2022-07-22", "url": "https://access.redhat.com/errata/RHSA-2022:5685" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5684 vom 2022-07-22", "url": "https://access.redhat.com/errata/RHSA-2022:5684" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5681 vom 2022-07-22", "url": "https://access.redhat.com/errata/RHSA-2022:5681" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-111 vom 2022-07-21", "url": "https://alas.aws.amazon.com/AL2022/ALAS-2022-111.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-5687 vom 2022-07-22", "url": "http://linux.oracle.com/errata/ELSA-2022-5687.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-112 vom 2022-07-21", "url": "https://alas.aws.amazon.com/AL2022/ALAS-2022-112.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-113 vom 2022-07-21", "url": "https://alas.aws.amazon.com/AL2022/ALAS-2022-113.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-5683 vom 2022-07-22", "url": "http://linux.oracle.com/errata/ELSA-2022-5683.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5687 vom 2022-07-22", "url": "https://access.redhat.com/errata/RHSA-2022:5687" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5683 vom 2022-07-22", "url": "https://access.redhat.com/errata/RHSA-2022:5683" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2CORRETTO8-2022-003 vom 2022-07-21", "url": "https://alas.aws.amazon.com/AL2/ALASCORRETTO8-2022-003.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-1822 vom 2022-07-21", "url": "https://alas.aws.amazon.com/AL2/ALAS-2022-1822.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-5188 vom 2022-07-22", "url": "https://lists.debian.org/debian-security-announce/2022/msg00157.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-5695 vom 2022-07-26", "url": "http://linux.oracle.com/errata/ELSA-2022-5695.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-5696 vom 2022-07-26", "url": "http://linux.oracle.com/errata/ELSA-2022-5696.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-5698 vom 2022-07-26", "url": "http://linux.oracle.com/errata/ELSA-2022-5698.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5696 vom 2022-07-26", "url": "https://access.redhat.com/errata/RHSA-2022:5696" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5697 vom 2022-07-26", "url": "https://access.redhat.com/errata/RHSA-2022:5697" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5698 vom 2022-07-26", "url": "https://access.redhat.com/errata/RHSA-2022:5698" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5700 vom 2022-07-26", "url": "https://access.redhat.com/errata/RHSA-2022:5700" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5701 vom 2022-07-26", "url": "https://access.redhat.com/errata/RHSA-2022:5701" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5695 vom 2022-07-26", "url": "https://access.redhat.com/errata/RHSA-2022:5695" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5709 vom 2022-07-26", "url": "https://access.redhat.com/errata/RHSA-2022:5709" }, { "category": "external", "summary": "Debian Security Advisory DSA-5192 vom 2022-07-26", "url": "https://lists.debian.org/debian-security-announce/2022/msg00161.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5726 vom 2022-07-27", "url": "https://access.redhat.com/errata/RHSA-2022:5726" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-5709 vom 2022-07-26", "url": "http://linux.oracle.com/errata/ELSA-2022-5709.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-5726 vom 2022-07-27", "url": "http://linux.oracle.com/errata/ELSA-2022-5726.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5736 vom 2022-07-28", "url": "https://access.redhat.com/errata/RHSA-2022:5736" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-5736 vom 2022-07-28", "url": "http://linux.oracle.com/errata/ELSA-2022-5736.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5756 vom 2022-07-29", "url": "https://access.redhat.com/errata/RHSA-2022:5756" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5757 vom 2022-07-29", "url": "https://access.redhat.com/errata/RHSA-2022:5757" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5755 vom 2022-07-29", "url": "https://access.redhat.com/errata/RHSA-2022:5755" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5754 vom 2022-07-28", "url": "https://access.redhat.com/errata/RHSA-2022:5754" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5753 vom 2022-07-28", "url": "https://access.redhat.com/errata/RHSA-2022:5753" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5758 vom 2022-07-29", "url": "https://access.redhat.com/errata/RHSA-2022:5758" }, { "category": "external", "summary": "AVAYA Security Advisory ASA-2022-107 vom 2022-07-28", "url": "https://downloads.avaya.com/css/P8/documents/101083044" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2610-1 vom 2022-08-01", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011733.html" }, { "category": "external", "summary": "CentOS Security Advisory CESA-2022:5698 vom 2022-08-02", "url": "https://lists.centos.org/pipermail/centos-announce/2022-August/073599.html" }, { "category": "external", "summary": "CentOS Security Advisory CESA-2022:5687 vom 2022-08-02", "url": "https://lists.centos.org/pipermail/centos-announce/2022-August/073598.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-121 vom 2022-08-05", "url": "https://alas.aws.amazon.com/AL2022/ALAS-2022-121.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2707-1 vom 2022-08-09", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011827.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2819-1 vom 2022-08-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011920.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:2856-1 vom 2022-08-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011952.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:3152-1 vom 2022-09-07", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-September/012164.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2-2022-1836 vom 2022-09-15", "url": "https://alas.aws.amazon.com/AL2/ALAS-2022-1836.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2JAVA-OPENJDK11-2022-002 vom 2022-09-15", "url": "https://alas.aws.amazon.com/AL2/ALASJAVA-OPENJDK11-2022-002.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:3708 vom 2024-06-06", "url": "https://access.redhat.com/errata/RHSA-2024:3708" } ], "source_lang": "en-US", "title": "OpenJDK: Mehrere Schwachstellen erm\u00f6glichen Codeausf\u00fchrung", "tracking": { "current_release_date": "2024-06-06T22:00:00.000+00:00", "generator": { "date": "2024-06-07T08:09:09.163+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-0746", "initial_release_date": "2022-07-19T22:00:00.000+00:00", "revision_history": [ { "date": "2022-07-19T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-07-21T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Red Hat, Amazon und Oracle Linux aufgenommen" }, { "date": "2022-07-24T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2022-07-25T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen" }, { "date": "2022-07-26T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Debian, Red Hat, Fedora und Oracle Linux aufgenommen" }, { "date": "2022-07-27T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen" }, { "date": "2022-07-28T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-07-31T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von AVAYA aufgenommen" }, { "date": "2022-08-01T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-08-03T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von CentOS aufgenommen" }, { "date": "2022-08-04T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2022-08-09T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-08-16T22:00:00.000+00:00", "number": "13", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-08-21T22:00:00.000+00:00", "number": "14", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-09-07T22:00:00.000+00:00", "number": "15", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-09-14T22:00:00.000+00:00", "number": "16", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2024-06-06T22:00:00.000+00:00", "number": "17", "summary": "Neue Updates von Red Hat aufgenommen" } ], "status": "final", "version": "17" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Avaya Aura Application Enablement Services", "product": { "name": "Avaya Aura Application Enablement Services", "product_id": "T015516", "product_identification_helper": { "cpe": "cpe:/a:avaya:aura_application_enablement_services:-" } } }, { "category": "product_name", "name": "Avaya Aura Communication Manager", "product": { "name": "Avaya Aura Communication Manager", "product_id": "T015126", "product_identification_helper": { "cpe": "cpe:/a:avaya:communication_manager:-" } } }, { "category": "product_name", "name": "Avaya Aura Experience Portal", "product": { "name": "Avaya Aura Experience Portal", "product_id": "T015519", "product_identification_helper": { "cpe": "cpe:/a:avaya:aura_experience_portal:-" } } }, { "category": "product_name", "name": "Avaya Aura Session Manager", "product": { "name": "Avaya Aura Session Manager", "product_id": "T015127", "product_identification_helper": { "cpe": "cpe:/a:avaya:session_manager:-" } } }, { "category": "product_name", "name": "Avaya Aura System Manager", "product": { "name": "Avaya Aura System Manager", "product_id": "T015518", "product_identification_helper": { "cpe": "cpe:/a:avaya:aura_system_manager:-" } } } ], "category": "vendor", "name": "Avaya" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Open Source CentOS", "product": { "name": "Open Source CentOS", "product_id": "1727", "product_identification_helper": { "cpe": "cpe:/o:centos:centos:-" } } }, { "category": "product_name", "name": "Open Source OpenJDK", "product": { "name": "Open Source OpenJDK", "product_id": "185975", "product_identification_helper": { "cpe": "cpe:/a:oracle:openjdk:1.6.0" } } } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } }, { "branches": [ { "category": "product_version", "name": "Camel for Spring Boot 1", "product": { "name": "Red Hat Integration Camel for Spring Boot 1", "product_id": "T035240", "product_identification_helper": { "cpe": "cpe:/a:redhat:integration:camel_for_spring_boot_1" } } } ], "category": "product_name", "name": "Integration" } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21540", "notes": [ { "category": "description", "text": "In OpenJDK existieren mehrere Schwachstellen. Diese sind auf Fehler in \"Oracle Java\" zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "185975", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T035240", "T004914", "2951", "T002207", "398363", "1727" ] }, "release_date": "2022-07-19T22:00:00Z", "title": "CVE-2022-21540" }, { "cve": "CVE-2022-21541", "notes": [ { "category": "description", "text": "In OpenJDK existieren mehrere Schwachstellen. Diese sind auf Fehler in \"Oracle Java\" zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "185975", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T035240", "T004914", "2951", "T002207", "398363", "1727" ] }, "release_date": "2022-07-19T22:00:00Z", "title": "CVE-2022-21541" }, { "cve": "CVE-2022-21549", "notes": [ { "category": "description", "text": "In OpenJDK existieren mehrere Schwachstellen. Diese sind auf Fehler in \"Oracle Java\" zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "185975", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T035240", "T004914", "2951", "T002207", "398363", "1727" ] }, "release_date": "2022-07-19T22:00:00Z", "title": "CVE-2022-21549" }, { "cve": "CVE-2022-34169", "notes": [ { "category": "description", "text": "In OpenJDK existieren mehrere Schwachstellen. Diese sind auf Fehler in \"Oracle Java\" zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder Dateien zu manipulieren." } ], "product_status": { "known_affected": [ "185975", "T015519", "T015518", "67646", "T015516", "T015127", "T015126", "T035240", "T004914", "2951", "T002207", "398363", "1727" ] }, "release_date": "2022-07-19T22:00:00Z", "title": "CVE-2022-34169" } ] }
wid-sec-w-2024-0870
Vulnerability from csaf_certbund
Published
2024-04-16 22:00
Modified
2024-04-22 22:00
Summary
Oracle Communications Applications: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Communications Applications umfasst eine Sammlung von Werkzeugen zur Verwaltung von Messaging-, Kommunikationsdiensten und -ressourcen.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Oracle Communications Applications ausnutzen, um die Vertraulichkeit, Integrität und Verfügbarkeit zu gefährden.
Betroffene Betriebssysteme
- Windows
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Communications Applications umfasst eine Sammlung von Werkzeugen zur Verwaltung von Messaging-, Kommunikationsdiensten und -ressourcen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Oracle Communications Applications ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0870 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0870.json" }, { "category": "self", "summary": "WID-SEC-2024-0870 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0870" }, { "category": "external", "summary": "Oracle Critical Patch Update Advisory - April 2024 - Appendix Oracle Communications Applications vom 2024-04-16", "url": "https://www.oracle.com/security-alerts/cpuapr2024.html#AppendixCAGBU" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:1797 vom 2024-04-22", "url": "https://access.redhat.com/errata/RHSA-2024:1797" } ], "source_lang": "en-US", "title": "Oracle Communications Applications: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-04-22T22:00:00.000+00:00", "generator": { "date": "2024-04-23T08:03:05.500+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2024-0870", "initial_release_date": "2024-04-16T22:00:00.000+00:00", "revision_history": [ { "date": "2024-04-16T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-04-22T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Red Hat aufgenommen" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "7.4.1", "product": { "name": "Oracle Communications Applications 7.4.1", "product_id": "T018939", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications_applications:7.4.1" } } }, { "category": "product_version", "name": "7.4.2", "product": { "name": "Oracle Communications Applications 7.4.2", "product_id": "T018940", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications_applications:7.4.2" } } }, { "category": "product_version_range", "name": "\u003c=12.0.0.8", "product": { "name": "Oracle Communications Applications \u003c=12.0.0.8", "product_id": "T034251", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications_applications:12.0.0.8" } } }, { "category": "product_version", "name": "15.0.0.0", "product": { "name": "Oracle Communications Applications 15.0.0.0", "product_id": "T034252", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications_applications:15.0.0.0" } } }, { "category": "product_version", "name": "7.3.6.4", "product": { "name": "Oracle Communications Applications 7.3.6.4", "product_id": "T034253", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications_applications:7.3.6.4" } } }, { "category": "product_version_range", "name": "\u003c=7.4.2", "product": { "name": "Oracle Communications Applications \u003c=7.4.2", "product_id": "T034254", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications_applications:7.4.2" } } }, { "category": "product_version", "name": "7.5.0", "product": { "name": "Oracle Communications Applications 7.5.0", "product_id": "T034255", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications_applications:7.5.0" } } }, { "category": "product_version", "name": "7.5.1", "product": { "name": "Oracle Communications Applications 7.5.1", "product_id": "T034256", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications_applications:7.5.1" } } }, { "category": "product_version", "name": "8.0.0.1.0", "product": { "name": "Oracle Communications Applications 8.0.0.1.0", "product_id": "T034257", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications_applications:8.0.0.1.0" } } } ], "category": "product_name", "name": "Communications Applications" } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-37533", "notes": [ { "category": "description", "text": "In Oracle Communications Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T018940", "67646", "T034253", "T034252", "T018939", "T034257", "T034256", "T034255" ], "last_affected": [ "T034251", "T034254" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2021-37533" }, { "cve": "CVE-2022-34169", "notes": [ { "category": "description", "text": "In Oracle Communications Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T018940", "67646", "T034253", "T034252", "T018939", "T034257", "T034256", "T034255" ], "last_affected": [ "T034251", "T034254" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2022-34169" }, { "cve": "CVE-2022-34381", "notes": [ { "category": "description", "text": "In Oracle Communications Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T018940", "67646", "T034253", "T034252", "T018939", "T034257", "T034256", "T034255" ], "last_affected": [ "T034251", "T034254" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2022-34381" }, { "cve": "CVE-2023-0833", "notes": [ { "category": "description", "text": "In Oracle Communications Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T018940", "67646", "T034253", "T034252", "T018939", "T034257", "T034256", "T034255" ], "last_affected": [ "T034251", "T034254" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2023-0833" }, { "cve": "CVE-2023-2976", "notes": [ { "category": "description", "text": "In Oracle Communications Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T018940", "67646", "T034253", "T034252", "T018939", "T034257", "T034256", "T034255" ], "last_affected": [ "T034251", "T034254" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2023-2976" }, { "cve": "CVE-2023-34053", "notes": [ { "category": "description", "text": "In Oracle Communications Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T018940", "67646", "T034253", "T034252", "T018939", "T034257", "T034256", "T034255" ], "last_affected": [ "T034251", "T034254" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2023-34053" }, { "cve": "CVE-2023-34055", "notes": [ { "category": "description", "text": "In Oracle Communications Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T018940", "67646", "T034253", "T034252", "T018939", "T034257", "T034256", "T034255" ], "last_affected": [ "T034251", "T034254" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2023-34055" }, { "cve": "CVE-2023-4043", "notes": [ { "category": "description", "text": "In Oracle Communications Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T018940", "67646", "T034253", "T034252", "T018939", "T034257", "T034256", "T034255" ], "last_affected": [ "T034251", "T034254" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2023-4043" }, { "cve": "CVE-2023-44487", "notes": [ { "category": "description", "text": "In Oracle Communications Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T018940", "67646", "T034253", "T034252", "T018939", "T034257", "T034256", "T034255" ], "last_affected": [ "T034251", "T034254" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2023-44487" }, { "cve": "CVE-2023-47100", "notes": [ { "category": "description", "text": "In Oracle Communications Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T018940", "67646", "T034253", "T034252", "T018939", "T034257", "T034256", "T034255" ], "last_affected": [ "T034251", "T034254" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2023-47100" }, { "cve": "CVE-2023-6378", "notes": [ { "category": "description", "text": "In Oracle Communications Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T018940", "67646", "T034253", "T034252", "T018939", "T034257", "T034256", "T034255" ], "last_affected": [ "T034251", "T034254" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2023-6378" }, { "cve": "CVE-2024-21634", "notes": [ { "category": "description", "text": "In Oracle Communications Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T018940", "67646", "T034253", "T034252", "T018939", "T034257", "T034256", "T034255" ], "last_affected": [ "T034251", "T034254" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2024-21634" }, { "cve": "CVE-2024-26308", "notes": [ { "category": "description", "text": "In Oracle Communications Applications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T018940", "67646", "T034253", "T034252", "T018939", "T034257", "T034256", "T034255" ], "last_affected": [ "T034251", "T034254" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2024-26308" } ] }
WID-SEC-W-2024-0788
Vulnerability from csaf_certbund
Published
2024-04-03 22:00
Modified
2024-04-03 22:00
Summary
IBM Business Automation Workflow: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
IBM Business Automation Workflow ist eine Lösung zur Automatisierung von Arbeitsabläufen.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in IBM Business Automation Workflow ausnutzen, um beliebigen Programmcode auszuführen oder Sicherheitsvorkehrungen zu umgehen.
Betroffene Betriebssysteme
- Sonstiges
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "IBM Business Automation Workflow ist eine L\u00f6sung zur Automatisierung von Arbeitsabl\u00e4ufen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in IBM Business Automation Workflow ausnutzen, um beliebigen Programmcode auszuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen.", "title": "Angriff" }, { "category": "general", "text": "- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0788 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0788.json" }, { "category": "self", "summary": "WID-SEC-2024-0788 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0788" }, { "category": "external", "summary": "IBM Security Bulletin vom 2024-04-03", "url": "https://www.ibm.com/support/pages/node/7145900" } ], "source_lang": "en-US", "title": "IBM Business Automation Workflow: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-04-03T22:00:00.000+00:00", "generator": { "date": "2024-04-04T11:05:57.909+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2024-0788", "initial_release_date": "2024-04-03T22:00:00.000+00:00", "revision_history": [ { "date": "2024-04-03T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c 23.0.2-IF003", "product": { "name": "IBM Business Automation Workflow \u003c 23.0.2-IF003", "product_id": "T033899", "product_identification_helper": { "cpe": "cpe:/a:ibm:business_automation_workflow:23.0.2-if003" } } } ], "category": "product_name", "name": "Business Automation Workflow" } ], "category": "vendor", "name": "IBM" } ] }, "vulnerabilities": [ { "cve": "CVE-2014-0107", "notes": [ { "category": "description", "text": "In IBM Business Automation Workflow existieren mehrere Schwachstellen. Diese bestehen in der Drittanbieter-Komponente \"Apache Xalan-Java\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen." } ], "release_date": "2024-04-03T22:00:00Z", "title": "CVE-2014-0107" }, { "cve": "CVE-2022-34169", "notes": [ { "category": "description", "text": "In IBM Business Automation Workflow existieren mehrere Schwachstellen. Diese bestehen in der Drittanbieter-Komponente \"Apache Xalan-Java\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen." } ], "release_date": "2024-04-03T22:00:00Z", "title": "CVE-2022-34169" } ] }
ncsc-2024-0411
Vulnerability from csaf_ncscnl
Published
2024-10-17 13:15
Modified
2024-10-17 13:15
Summary
Kwetsbaarheden verholpen in Oracle Database producten
Notes
The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:
NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.
NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.
This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.
Feiten
Oracle heeft kwetsbaarheden verholpen in diverse Database producten en subsystemen, zoals de Core database, Application Express, Autonomous Health Framework, Essbase, GoldenGate, SQL Developer en Secure Backup.
Interpretaties
Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorieën schade:
- Denial-of-Service (DoS)
- Manipuleren van data
- Toegang tot gevoelige gegevens
Oplossingen
Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.
Kans
medium
Schade
high
CWE-130
Improper Handling of Length Parameter Inconsistency
CWE-208
Observable Timing Discrepancy
CWE-776
Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')
CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
CWE-755
Improper Handling of Exceptional Conditions
CWE-834
Excessive Iteration
CWE-407
Inefficient Algorithmic Complexity
CWE-178
Improper Handling of Case Sensitivity
CWE-732
Incorrect Permission Assignment for Critical Resource
CWE-415
Double Free
CWE-311
Missing Encryption of Sensitive Data
CWE-427
Uncontrolled Search Path Element
CWE-172
Encoding Error
CWE-680
Integer Overflow to Buffer Overflow
CWE-426
Untrusted Search Path
CWE-843
Access of Resource Using Incompatible Type ('Type Confusion')
CWE-116
Improper Encoding or Escaping of Output
CWE-345
Insufficient Verification of Data Authenticity
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CWE-203
Observable Discrepancy
CWE-190
Integer Overflow or Wraparound
CWE-552
Files or Directories Accessible to External Parties
CWE-639
Authorization Bypass Through User-Controlled Key
CWE-125
Out-of-bounds Read
CWE-404
Improper Resource Shutdown or Release
CWE-275
CWE-275
CWE-284
Improper Access Control
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE-1333
Inefficient Regular Expression Complexity
CWE-1321
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
CWE-416
Use After Free
CWE-401
Missing Release of Memory after Effective Lifetime
CWE-476
NULL Pointer Dereference
CWE-295
Improper Certificate Validation
CWE-668
Exposure of Resource to Wrong Sphere
CWE-829
Inclusion of Functionality from Untrusted Control Sphere
CWE-327
Use of a Broken or Risky Cryptographic Algorithm
CWE-400
Uncontrolled Resource Consumption
CWE-770
Allocation of Resources Without Limits or Throttling
CWE-502
Deserialization of Untrusted Data
CWE-918
Server-Side Request Forgery (SSRF)
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CWE-787
Out-of-bounds Write
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE-122
Heap-based Buffer Overflow
CWE-121
Stack-based Buffer Overflow
CWE-681
Incorrect Conversion between Numeric Types
CWE-835
Loop with Unreachable Exit Condition ('Infinite Loop')
CWE-269
Improper Privilege Management
CWE-20
Improper Input Validation
CWE-87
Improper Neutralization of Alternate XSS Syntax
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CWE-18
CWE-18
CWE-385
Covert Timing Channel
CWE-606
Unchecked Input for Loop Condition
CWE-192
Integer Coercion Error
CWE-390
Detection of Error Condition Without Action
CWE-1325
Improperly Controlled Sequential Memory Allocation
CWE-222
Truncation of Security-relevant Information
CWE-131
Incorrect Calculation of Buffer Size
CWE-59
Improper Link Resolution Before File Access ('Link Following')
CWE-304
Missing Critical Step in Authentication
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "Oracle heeft kwetsbaarheden verholpen in diverse Database producten en subsystemen, zoals de Core database, Application Express, Autonomous Health Framework, Essbase, GoldenGate, SQL Developer en Secure Backup.", "title": "Feiten" }, { "category": "description", "text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Denial-of-Service (DoS)\n- Manipuleren van data\n- Toegang tot gevoelige gegevens", "title": "Interpretaties" }, { "category": "description", "text": "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.", "title": "Oplossingen" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Improper Handling of Length Parameter Inconsistency", "title": "CWE-130" }, { "category": "general", "text": "Observable Timing Discrepancy", "title": "CWE-208" }, { "category": "general", "text": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)", "title": "CWE-776" }, { "category": "general", "text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)", "title": "CWE-88" }, { "category": "general", "text": "Improper Handling of Exceptional Conditions", "title": "CWE-755" }, { "category": "general", "text": "Excessive Iteration", "title": "CWE-834" }, { "category": "general", "text": "Inefficient Algorithmic Complexity", "title": "CWE-407" }, { "category": "general", "text": "Improper Handling of Case Sensitivity", "title": "CWE-178" }, { "category": "general", "text": "Incorrect Permission Assignment for Critical Resource", "title": "CWE-732" }, { "category": "general", "text": "Double Free", "title": "CWE-415" }, { "category": "general", "text": "Missing Encryption of Sensitive Data", "title": "CWE-311" }, { "category": "general", "text": "Uncontrolled Search Path Element", "title": "CWE-427" }, { "category": "general", "text": "Encoding Error", "title": "CWE-172" }, { "category": "general", "text": "Integer Overflow to Buffer Overflow", "title": "CWE-680" }, { "category": "general", "text": "Untrusted Search Path", "title": "CWE-426" }, { "category": "general", "text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "title": "CWE-843" }, { "category": "general", "text": "Improper Encoding or Escaping of Output", "title": "CWE-116" }, { "category": "general", "text": "Insufficient Verification of Data Authenticity", "title": "CWE-345" }, { "category": "general", "text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "title": "CWE-77" }, { "category": "general", "text": "Observable Discrepancy", "title": "CWE-203" }, { "category": "general", "text": "Integer Overflow or Wraparound", "title": "CWE-190" }, { "category": "general", "text": "Files or Directories Accessible to External Parties", "title": "CWE-552" }, { "category": "general", "text": "Authorization Bypass Through User-Controlled Key", "title": "CWE-639" }, { "category": "general", "text": "Out-of-bounds Read", "title": "CWE-125" }, { "category": "general", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "general", "text": "CWE-275", "title": "CWE-275" }, { "category": "general", "text": "Improper Access Control", "title": "CWE-284" }, { "category": "general", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" }, { "category": "general", "text": "Inefficient Regular Expression Complexity", "title": "CWE-1333" }, { "category": "general", "text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)", "title": "CWE-1321" }, { "category": "general", "text": "Use After Free", "title": "CWE-416" }, { "category": "general", "text": "Missing Release of Memory after Effective Lifetime", "title": "CWE-401" }, { "category": "general", "text": "NULL Pointer Dereference", "title": "CWE-476" }, { "category": "general", "text": "Improper Certificate Validation", "title": "CWE-295" }, { "category": "general", "text": "Exposure of Resource to Wrong Sphere", "title": "CWE-668" }, { "category": "general", "text": "Inclusion of Functionality from Untrusted Control Sphere", "title": "CWE-829" }, { "category": "general", "text": "Use of a Broken or Risky Cryptographic Algorithm", "title": "CWE-327" }, { "category": "general", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "general", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" }, { "category": "general", "text": "Deserialization of Untrusted Data", "title": "CWE-502" }, { "category": "general", "text": "Server-Side Request Forgery (SSRF)", "title": "CWE-918" }, { "category": "general", "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "title": "CWE-78" }, { "category": "general", "text": "Out-of-bounds Write", "title": "CWE-787" }, { "category": "general", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "general", "text": "Heap-based Buffer Overflow", "title": "CWE-122" }, { "category": "general", "text": "Stack-based Buffer Overflow", "title": "CWE-121" }, { "category": "general", "text": "Incorrect Conversion between Numeric Types", "title": "CWE-681" }, { "category": "general", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" }, { "category": "general", "text": "Improper Privilege Management", "title": "CWE-269" }, { "category": "general", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "general", "text": "Improper Neutralization of Alternate XSS Syntax", "title": "CWE-87" }, { "category": "general", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" }, { "category": "general", "text": "CWE-18", "title": "CWE-18" }, { "category": "general", "text": "Covert Timing Channel", "title": "CWE-385" }, { "category": "general", "text": "Unchecked Input for Loop Condition", "title": "CWE-606" }, { "category": "general", "text": "Integer Coercion Error", "title": "CWE-192" }, { "category": "general", "text": "Detection of Error Condition Without Action", "title": "CWE-390" }, { "category": "general", "text": "Improperly Controlled Sequential Memory Allocation", "title": "CWE-1325" }, { "category": "general", "text": "Truncation of Security-relevant Information", "title": "CWE-222" }, { "category": "general", "text": "Incorrect Calculation of Buffer Size", "title": "CWE-131" }, { "category": "general", "text": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)", "title": "CWE-59" }, { "category": "general", "text": "Missing Critical Step in Authentication", "title": "CWE-304" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "references": [ { "category": "external", "summary": "Reference - cveprojectv5; hkcert; nvd; oracle; redhat", "url": "https://www.oracle.com/security-alerts/cpuoct2024.html" } ], "title": "Kwetsbaarheden verholpen in Oracle Database producten", "tracking": { "current_release_date": "2024-10-17T13:15:19.595269Z", "id": "NCSC-2024-0411", "initial_release_date": "2024-10-17T13:15:19.595269Z", "revision_history": [ { "date": "2024-10-17T13:15:19.595269Z", "number": "0", "summary": "Initiele versie" } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "database_-_grid", "product": { "name": "database_-_grid", "product_id": "CSAFPID-1673504", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_grid:19.3-19.24:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_grid", "product": { "name": "database_-_grid", "product_id": "CSAFPID-1673506", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_grid:21.3-21.15:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_core", "product": { "name": "database_-_core", "product_id": "CSAFPID-1673386", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_core:19.3-19.24:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_core", "product": { "name": "database_-_core", "product_id": "CSAFPID-1673385", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_core:21.3-21.15:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_core", "product": { "name": "database_-_core", "product_id": "CSAFPID-1673442", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_core:23.4-23.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_security", "product": { "name": "database_-_security", "product_id": "CSAFPID-1673507", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_security:19.3-19.24:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_security", "product": { "name": "database_-_security", "product_id": "CSAFPID-1673509", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_security:21.3-21.15:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_security", "product": { "name": "database_-_security", "product_id": "CSAFPID-1673508", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_security:23.4-23.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "spatial_and_graph_mapviewer", "product": { "name": "spatial_and_graph_mapviewer", "product_id": "CSAFPID-912561", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:spatial_and_graph_mapviewer:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "spatial_and_graph", "product": { "name": "spatial_and_graph", "product_id": "CSAFPID-764250", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:spatial_and_graph:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "spatial_and_graph", "product": { "name": "spatial_and_graph", "product_id": "CSAFPID-1673511", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:spatial_and_graph:19.3-19.24:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "spatial_and_graph", "product": { "name": "spatial_and_graph", "product_id": "CSAFPID-1673512", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:spatial_and_graph:21.3-21.15:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "spatial_and_graph", "product": { "name": "spatial_and_graph", "product_id": "CSAFPID-816800", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:spatial_and_graph:23.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "spatial_and_graph", "product": { "name": "spatial_and_graph", "product_id": "CSAFPID-1673529", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:spatial_and_graph:23.4-23.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fleet_patching_and_provisioning_-_micronaut", "product": { "name": "fleet_patching_and_provisioning_-_micronaut", "product_id": "CSAFPID-1673492", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:fleet_patching_and_provisioning_-_micronaut:23.4-23.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fleet_patching_and_provisioning", "product": { "name": "fleet_patching_and_provisioning", "product_id": "CSAFPID-1503603", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:fleet_patching_and_provisioning:23.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_xml_database", "product": { "name": "database_-_xml_database", "product_id": "CSAFPID-1673445", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_xml_database:19.3-19.24:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_xml_database", "product": { "name": "database_-_xml_database", "product_id": "CSAFPID-1673443", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_xml_database:21.3-21.15:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_xml_database", "product": { "name": "database_-_xml_database", "product_id": "CSAFPID-1673444", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_xml_database:23.4-23.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_java_vm", "product": { "name": "database_-_java_vm", "product_id": "CSAFPID-1673451", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_java_vm:19.3-19.24:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_java_vm", "product": { "name": "database_-_java_vm", "product_id": "CSAFPID-1673450", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_java_vm:21.3-21.15:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_java_vm", "product": { "name": "database_-_java_vm", "product_id": "CSAFPID-1673452", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_java_vm:23.4-23.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "autonomous_health_framework", "product": { "name": "autonomous_health_framework", "product_id": "CSAFPID-816798", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:autonomous_health_framework:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "autonomous_health_framework", "product": { "name": "autonomous_health_framework", "product_id": "CSAFPID-816799", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:autonomous_health_framework:23.10:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "autonomous_health_framework", "product": { "name": "autonomous_health_framework", "product_id": "CSAFPID-1673525", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:autonomous_health_framework:prior_to_24.9:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "graalvm_for_jdk", "product": { "name": "graalvm_for_jdk", "product_id": "CSAFPID-912046", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "graalvm_for_jdk", "product": { "name": "graalvm_for_jdk", "product_id": "CSAFPID-1503299", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:17.0.11:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "graalvm_for_jdk", "product": { "name": "graalvm_for_jdk", "product_id": "CSAFPID-816855", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:17.0.9:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "graalvm_for_jdk", "product": { "name": "graalvm_for_jdk", "product_id": "CSAFPID-816361", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:21.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "graalvm_for_jdk", "product": { "name": "graalvm_for_jdk", "product_id": "CSAFPID-912045", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "graalvm_for_jdk", "product": { "name": "graalvm_for_jdk", "product_id": "CSAFPID-1503302", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:21.0.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "graalvm_for_jdk", "product": { "name": "graalvm_for_jdk", "product_id": "CSAFPID-912044", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "graalvm_for_jdk", "product": { "name": "graalvm_for_jdk", "product_id": "CSAFPID-1503306", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:22.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "graalvm_for_jdk", "product": { "name": "graalvm_for_jdk", "product_id": "CSAFPID-816852", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:graalvm_enterprise_edition20.3.12:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "graalvm_for_jdk", "product": { "name": "graalvm_for_jdk", "product_id": "CSAFPID-912600", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:graalvm_enterprise_edition20.3.13:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "graalvm_for_jdk", "product": { "name": "graalvm_for_jdk", "product_id": "CSAFPID-816853", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:graalvm_enterprise_edition21.3.8:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "graalvm_for_jdk", "product": { "name": "graalvm_for_jdk", "product_id": "CSAFPID-912601", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:graalvm_enterprise_edition21.3.9:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "graalvm_for_jdk", "product": { "name": "graalvm_for_jdk", "product_id": "CSAFPID-816854", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:graalvm_enterprise_edition22.3.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sqlcl", "product": { "name": "sqlcl", "product_id": "CSAFPID-816801", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:sqlcl:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sqlcl", "product": { "name": "sqlcl", "product_id": "CSAFPID-1673405", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:sqlcl:23.4-23.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "application_express_administration", "product": { "name": "application_express_administration", "product_id": "CSAFPID-764731", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:application_express_administration:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "application_express_customers_plugin", "product": { "name": "application_express_customers_plugin", "product_id": "CSAFPID-764732", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:application_express_customers_plugin:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "application_express_team_calendar_plugin", "product": { "name": "application_express_team_calendar_plugin", "product_id": "CSAFPID-764733", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:application_express_team_calendar_plugin:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "application_express", "product": { "name": "application_express", "product_id": "CSAFPID-266119", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:application_express:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "application_express", "product": { "name": "application_express", "product_id": "CSAFPID-1673510", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:application_express:23.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "application_express", "product": { "name": "application_express", "product_id": "CSAFPID-1503575", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:application_express:23.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "application_express", "product": { "name": "application_express", "product_id": "CSAFPID-1673188", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:application_express:24.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "autonomous_health_framework", "product": { "name": "autonomous_health_framework", "product_id": "CSAFPID-765238", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:autonomous_health_framework:19c:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "autonomous_health_framework", "product": { "name": "autonomous_health_framework", "product_id": "CSAFPID-765239", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:autonomous_health_framework:21c:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "blockchain_platform", "product": { "name": "blockchain_platform", "product_id": "CSAFPID-764779", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:blockchain_platform:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "blockchain_platform", "product": { "name": "blockchain_platform", "product_id": "CSAFPID-89587", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:blockchain_platform:21.1.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "essbase", "product": { "name": "essbase", "product_id": "CSAFPID-765259", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:essbase:_security_and_provisioning___21.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "essbase", "product": { "name": "essbase", "product_id": "CSAFPID-187448", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:essbase:21.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "essbase", "product": { "name": "essbase", "product_id": "CSAFPID-94075", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:essbase:21.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "essbase", "product": { "name": "essbase", "product_id": "CSAFPID-220886", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:essbase:21.4.3.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "essbase", "product": { "name": "essbase", "product_id": "CSAFPID-611394", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:essbase:21.5.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "essbase", "product": { "name": "essbase", "product_id": "CSAFPID-816317", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:essbase:21.5.3.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "essbase", "product": { "name": "essbase", "product_id": "CSAFPID-912567", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:essbase:21.5.4.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "essbase", "product": { "name": "essbase", "product_id": "CSAFPID-1503612", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:essbase:21.5.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "essbase", "product": { "name": "essbase", "product_id": "CSAFPID-1673479", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:essbase:21.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "oracle_essbase", "product": { "name": "oracle_essbase", "product_id": "CSAFPID-1650506", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:oracle_essbase:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_big_data_and_application_adapters", "product": { "name": "goldengate_big_data_and_application_adapters", "product_id": "CSAFPID-816845", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_big_data_and_application_adapters", "product": { "name": "goldengate_big_data_and_application_adapters", "product_id": "CSAFPID-1650825", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:19.1.0.0.0-19.1.0.0.18:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_big_data_and_application_adapters", "product": { "name": "goldengate_big_data_and_application_adapters", "product_id": "CSAFPID-1673404", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:19.1.0.0.0-19.1.0.0.9:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_big_data_and_application_adapters", "product": { "name": "goldengate_big_data_and_application_adapters", "product_id": "CSAFPID-1650831", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:21.3-21.14.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_big_data", "product": { "name": "goldengate_big_data", "product_id": "CSAFPID-764274", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_big_data:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_stream_analytics", "product": { "name": "goldengate_stream_analytics", "product_id": "CSAFPID-764752", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_stream_analytics:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_stream_analytics", "product": { "name": "goldengate_stream_analytics", "product_id": "CSAFPID-1673384", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_stream_analytics:19.1.0.0.0-19.1.0.0.9:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_stream_analytics", "product": { "name": "goldengate_stream_analytics", "product_id": "CSAFPID-220192", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_stream_analytics:19.1.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_stream_analytics", "product": { "name": "goldengate_stream_analytics", "product_id": "CSAFPID-220193", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_stream_analytics:19.1.0.0.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_studio", "product": { "name": "goldengate_studio", "product_id": "CSAFPID-816846", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_studio:12.2.0.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_studio", "product": { "name": "goldengate_studio", "product_id": "CSAFPID-611390", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_studio:12.2.1.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_studio", "product": { "name": "goldengate_studio", "product_id": "CSAFPID-764803", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_studio:fusion_middleware_12.2.1.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_veridata", "product": { "name": "goldengate_veridata", "product_id": "CSAFPID-764275", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_veridata:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate", "product": { "name": "goldengate", "product_id": "CSAFPID-342816", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate", "product": { "name": "goldengate", "product_id": "CSAFPID-1650767", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate:19.1.0.0.0-19.23.0.0.240716:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate", "product": { "name": "goldengate", "product_id": "CSAFPID-485902", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate:19.1.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate", "product": { "name": "goldengate", "product_id": "CSAFPID-1503736", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate:19.23.0.0.240716:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate", "product": { "name": "goldengate", "product_id": "CSAFPID-219912", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate:19c:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate", "product": { "name": "goldengate", "product_id": "CSAFPID-1503739", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate:21.14:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate", "product": { "name": "goldengate", "product_id": "CSAFPID-1650765", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate:21.3-21.14:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate", "product": { "name": "goldengate", "product_id": "CSAFPID-1503738", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate:21.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "oracle_goldengate_stream_analytics", "product": { "name": "oracle_goldengate_stream_analytics", "product_id": "CSAFPID-1650515", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:oracle_goldengate_stream_analytics:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "management_pack_for__goldengate", "product": { "name": "management_pack_for__goldengate", "product_id": "CSAFPID-764861", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:management_pack_for__goldengate:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "management_pack_for__goldengate", "product": { "name": "management_pack_for__goldengate", "product_id": "CSAFPID-1503640", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:management_pack_for__goldengate:12.2.1.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "oracle_goldengate_studio", "product": { "name": "oracle_goldengate_studio", "product_id": "CSAFPID-1650835", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:oracle_goldengate_studio:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "oracle_goldengate", "product": { "name": "oracle_goldengate", "product_id": "CSAFPID-1650575", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:oracle_goldengate:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-764813", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-1503661", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:1.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-1503663", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:1.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-1673497", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:1.5.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-764764", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:19.5.33:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-764765", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:20.3.28:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-1673491", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:20.3.40:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-764766", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:21.2.55:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-1673495", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:21.2.71:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-764767", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:22.3.26:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-1673493", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:22.3.45:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-1673489", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:23.3.33:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-1673488", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:24.1.17:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-1650757", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:prior_to_19.5.42:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-1650758", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:prior_to_20.3.40:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-1650761", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:prior_to_21.2.27:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-1650760", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:prior_to_22.3.46:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-1650759", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:prior_to_23.3.32:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "oracle_nosql_database", "product": { "name": "oracle_nosql_database", "product_id": "CSAFPID-1650584", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:oracle_nosql_database:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "oracle_secure_backup", "product": { "name": "oracle_secure_backup", "product_id": "CSAFPID-1650563", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:oracle_secure_backup:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "secure_backup", "product": { "name": "secure_backup", "product_id": "CSAFPID-667692", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:secure_backup:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "secure_backup", "product": { "name": "secure_backup", "product_id": "CSAFPID-345049", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:secure_backup:18.1.0.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "secure_backup", "product": { "name": "secure_backup", "product_id": "CSAFPID-611417", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:secure_backup:18.1.0.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "secure_backup", "product": { "name": "secure_backup", "product_id": "CSAFPID-1673422", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:secure_backup:19.1.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "oracle_sql_developer", "product": { "name": "oracle_sql_developer", "product_id": "CSAFPID-1650638", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:oracle_sql_developer:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sql_developer", "product": { "name": "sql_developer", "product_id": "CSAFPID-764822", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:sql_developer:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sql_developer", "product": { "name": "sql_developer", "product_id": "CSAFPID-220643", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:sql_developer:21.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sql_developer", "product": { "name": "sql_developer", "product_id": "CSAFPID-816870", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:sql_developer:22.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sql_developer", "product": { "name": "sql_developer", "product_id": "CSAFPID-816871", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:sql_developer:23.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sql_developer", "product": { "name": "sql_developer", "product_id": "CSAFPID-1673397", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:sql_developer:24.3.0:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "oracle" }, { "branches": [ { "category": "product_name", "name": "oracle_application_express", "product": { "name": "oracle_application_express", "product_id": "CSAFPID-1673144", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle_corporation:oracle_application_express:24.1:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "oracle_corporation" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-1471", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "notes": [ { "category": "other", "text": "Deserialization of Untrusted Data", "title": "CWE-502" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-764731", "CSAFPID-764732", "CSAFPID-764733", "CSAFPID-764250", "CSAFPID-611394", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-611390", "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-764764", "CSAFPID-764765", "CSAFPID-764766", "CSAFPID-764767", "CSAFPID-764779", "CSAFPID-94075", "CSAFPID-220886", "CSAFPID-764803", "CSAFPID-764813", "CSAFPID-342816", "CSAFPID-764752", "CSAFPID-764822", "CSAFPID-1650515", "CSAFPID-1650638", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816317", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-89587", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816361", "CSAFPID-220643", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-667692", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-912046", "CSAFPID-912045", "CSAFPID-912044" ] }, "references": [ { "category": "self", "summary": "CVE-2022-1471", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-1471.json" } ], "title": "CVE-2022-1471" }, { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "notes": [ { "category": "other", "text": "Integer Coercion Error", "title": "CWE-192" }, { "category": "other", "text": "Incorrect Conversion between Numeric Types", "title": "CWE-681" } ], "product_status": { "known_affected": [ "CSAFPID-764779", "CSAFPID-94075", "CSAFPID-342816", "CSAFPID-764803", "CSAFPID-764813", "CSAFPID-764822", "CSAFPID-764752", "CSAFPID-764275", "CSAFPID-764861", "CSAFPID-266119", "CSAFPID-187448", "CSAFPID-219912", "CSAFPID-765238", "CSAFPID-765239", "CSAFPID-765259", "CSAFPID-667692", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-764250", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816317", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816361", "CSAFPID-220643", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-1673384", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-912046", "CSAFPID-912045", "CSAFPID-912044", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] }, "references": [ { "category": "self", "summary": "CVE-2022-34169", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-34169.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-764779", "CSAFPID-94075", "CSAFPID-342816", "CSAFPID-764803", "CSAFPID-764813", "CSAFPID-764822", "CSAFPID-764752", "CSAFPID-764275", "CSAFPID-764861", "CSAFPID-266119", "CSAFPID-187448", "CSAFPID-219912", "CSAFPID-765238", "CSAFPID-765239", "CSAFPID-765259", "CSAFPID-667692", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-764250", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816317", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816361", "CSAFPID-220643", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-1673384", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-912046", "CSAFPID-912045", "CSAFPID-912044", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] } ], "title": "CVE-2022-34169" }, { "cve": "CVE-2022-36033", "cwe": { "id": "CWE-87", "name": "Improper Neutralization of Alternate XSS Syntax" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Alternate XSS Syntax", "title": "CWE-87" }, { "category": "other", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" } ], "product_status": { "known_affected": [ "CSAFPID-764250", "CSAFPID-611394", "CSAFPID-764731", "CSAFPID-764732", "CSAFPID-764733", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-611390", "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-764764", "CSAFPID-764765", "CSAFPID-764766", "CSAFPID-764767", "CSAFPID-764779", "CSAFPID-220886", "CSAFPID-94075", "CSAFPID-764803", "CSAFPID-342816", "CSAFPID-764752", "CSAFPID-764861", "CSAFPID-764813", "CSAFPID-764822", "CSAFPID-266119", "CSAFPID-187448", "CSAFPID-1650515", "CSAFPID-1650835", "CSAFPID-219912", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816317", "CSAFPID-667692", "CSAFPID-1673384", "CSAFPID-912561", "CSAFPID-1503575", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816361", "CSAFPID-220643", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-912567", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-912046", "CSAFPID-912045", "CSAFPID-912044", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] }, "references": [ { "category": "self", "summary": "CVE-2022-36033", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-36033.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-764250", "CSAFPID-611394", "CSAFPID-764731", "CSAFPID-764732", "CSAFPID-764733", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-611390", "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-764764", "CSAFPID-764765", "CSAFPID-764766", "CSAFPID-764767", "CSAFPID-764779", "CSAFPID-220886", "CSAFPID-94075", "CSAFPID-764803", "CSAFPID-342816", "CSAFPID-764752", "CSAFPID-764861", "CSAFPID-764813", "CSAFPID-764822", "CSAFPID-266119", "CSAFPID-187448", "CSAFPID-1650515", "CSAFPID-1650835", "CSAFPID-219912", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816317", "CSAFPID-667692", "CSAFPID-1673384", "CSAFPID-912561", "CSAFPID-1503575", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816361", "CSAFPID-220643", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-912567", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-912046", "CSAFPID-912045", "CSAFPID-912044", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] } ], "title": "CVE-2022-36033" }, { "cve": "CVE-2022-37454", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" }, { "category": "other", "text": "Integer Overflow to Buffer Overflow", "title": "CWE-680" } ], "product_status": { "known_affected": [ "CSAFPID-764250", "CSAFPID-611394", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-611390", "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-764731", "CSAFPID-764732", "CSAFPID-764733", "CSAFPID-220886", "CSAFPID-342816", "CSAFPID-764752", "CSAFPID-764764", "CSAFPID-764765", "CSAFPID-764766", "CSAFPID-764767", "CSAFPID-764779", "CSAFPID-94075", "CSAFPID-764803", "CSAFPID-764813", "CSAFPID-764822", "CSAFPID-1650563", "CSAFPID-89587", "CSAFPID-764861" ] }, "references": [ { "category": "self", "summary": "CVE-2022-37454", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-37454.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-764250", "CSAFPID-611394", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-611390", "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-764731", "CSAFPID-764732", "CSAFPID-764733", "CSAFPID-220886", "CSAFPID-342816", "CSAFPID-764752", "CSAFPID-764764", "CSAFPID-764765", "CSAFPID-764766", "CSAFPID-764767", "CSAFPID-764779", "CSAFPID-94075", "CSAFPID-764803", "CSAFPID-764813", "CSAFPID-764822", "CSAFPID-1650563", "CSAFPID-89587", "CSAFPID-764861" ] } ], "title": "CVE-2022-37454" }, { "cve": "CVE-2022-38136", "product_status": { "known_affected": [ "CSAFPID-1673385", "CSAFPID-1673386" ] }, "references": [ { "category": "self", "summary": "CVE-2022-38136", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-38136.json" } ], "title": "CVE-2022-38136" }, { "cve": "CVE-2022-40196", "product_status": { "known_affected": [ "CSAFPID-1673385", "CSAFPID-1673386" ] }, "references": [ { "category": "self", "summary": "CVE-2022-40196", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-40196.json" } ], "title": "CVE-2022-40196" }, { "cve": "CVE-2022-41342", "product_status": { "known_affected": [ "CSAFPID-1673385", "CSAFPID-1673386" ] }, "references": [ { "category": "self", "summary": "CVE-2022-41342", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-41342.json" } ], "title": "CVE-2022-41342" }, { "cve": "CVE-2022-42919", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "other", "text": "Missing Encryption of Sensitive Data", "title": "CWE-311" }, { "category": "other", "text": "Improper Privilege Management", "title": "CWE-269" } ], "product_status": { "known_affected": [ "CSAFPID-764250", "CSAFPID-611394", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-611390", "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-764731", "CSAFPID-764732", "CSAFPID-764733", "CSAFPID-220886", "CSAFPID-342816", "CSAFPID-764752", "CSAFPID-764764", "CSAFPID-764765", "CSAFPID-764766", "CSAFPID-764767", "CSAFPID-764779", "CSAFPID-94075", "CSAFPID-764803", "CSAFPID-764813", "CSAFPID-764822", "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2022-42919", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-42919.json" } ], "title": "CVE-2022-42919" }, { "cve": "CVE-2022-45061", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "other", "text": "Inefficient Algorithmic Complexity", "title": "CWE-407" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-764731", "CSAFPID-764732", "CSAFPID-764733", "CSAFPID-220886", "CSAFPID-764250", "CSAFPID-611394", "CSAFPID-342816", "CSAFPID-764752", "CSAFPID-764764", "CSAFPID-764765", "CSAFPID-764766", "CSAFPID-764767", "CSAFPID-764779", "CSAFPID-94075", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-611390", "CSAFPID-764803", "CSAFPID-764813", "CSAFPID-764822", "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2022-45061", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-45061.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-764731", "CSAFPID-764732", "CSAFPID-764733", "CSAFPID-220886", "CSAFPID-764250", "CSAFPID-611394", "CSAFPID-342816", "CSAFPID-764752", "CSAFPID-764764", "CSAFPID-764765", "CSAFPID-764766", "CSAFPID-764767", "CSAFPID-764779", "CSAFPID-94075", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-611390", "CSAFPID-764803", "CSAFPID-764813", "CSAFPID-764822", "CSAFPID-89587" ] } ], "title": "CVE-2022-45061" }, { "cve": "CVE-2022-46337", "product_status": { "known_affected": [ "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-1673384", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-764752", "CSAFPID-764275", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-912046", "CSAFPID-912045", "CSAFPID-912044", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-764250", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816317", "CSAFPID-816845", "CSAFPID-342816", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-816361", "CSAFPID-764813", "CSAFPID-220643", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-667692" ] }, "references": [ { "category": "self", "summary": "CVE-2022-46337", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-46337.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-1673384", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-764752", "CSAFPID-764275", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-912046", "CSAFPID-912045", "CSAFPID-912044", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-764250", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816317", "CSAFPID-816845", "CSAFPID-342816", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-816361", "CSAFPID-764813", "CSAFPID-220643", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-667692" ] } ], "title": "CVE-2022-46337" }, { "cve": "CVE-2023-2976", "cwe": { "id": "CWE-552", "name": "Files or Directories Accessible to External Parties" }, "notes": [ { "category": "other", "text": "Files or Directories Accessible to External Parties", "title": "CWE-552" } ], "product_status": { "known_affected": [ "CSAFPID-1650584", "CSAFPID-1650835", "CSAFPID-1650506", "CSAFPID-1650515", "CSAFPID-816317", "CSAFPID-816845", "CSAFPID-342816", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816361", "CSAFPID-764813", "CSAFPID-220643", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-667692", "CSAFPID-89587", "CSAFPID-1673397", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-345049", "CSAFPID-816801", "CSAFPID-611390", "CSAFPID-611394", "CSAFPID-611417", "CSAFPID-764250", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] }, "references": [ { "category": "self", "summary": "CVE-2023-2976", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-2976.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1650584", "CSAFPID-1650835", "CSAFPID-1650506", "CSAFPID-1650515", "CSAFPID-816317", "CSAFPID-816845", "CSAFPID-342816", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816361", "CSAFPID-764813", "CSAFPID-220643", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-667692", "CSAFPID-89587", "CSAFPID-1673397", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-345049", "CSAFPID-816801", "CSAFPID-611390", "CSAFPID-611394", "CSAFPID-611417", "CSAFPID-764250", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] } ], "title": "CVE-2023-2976" }, { "cve": "CVE-2023-4043", "cwe": { "id": "CWE-834", "name": "Excessive Iteration" }, "notes": [ { "category": "other", "text": "Excessive Iteration", "title": "CWE-834" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-1673405", "CSAFPID-1673397", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-764250", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] }, "references": [ { "category": "self", "summary": "CVE-2023-4043", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4043.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673405", "CSAFPID-1673397", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-764250", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] } ], "title": "CVE-2023-4043" }, { "cve": "CVE-2023-4759", "cwe": { "id": "CWE-59", "name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)" }, "notes": [ { "category": "other", "text": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)", "title": "CWE-59" }, { "category": "other", "text": "Improper Handling of Case Sensitivity", "title": "CWE-178" } ], "product_status": { "known_affected": [ "CSAFPID-1673397", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2023-4759", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4759.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673397", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2023-4759" }, { "cve": "CVE-2023-4863", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" }, { "category": "other", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" }, { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-89587", "CSAFPID-816846", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-342816", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-816798", "CSAFPID-816801" ] }, "references": [ { "category": "self", "summary": "CVE-2023-4863", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4863.json" } ], "title": "CVE-2023-4863" }, { "cve": "CVE-2023-5072", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-1650575", "CSAFPID-1650515", "CSAFPID-1650835", "CSAFPID-89587", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-764250", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] }, "references": [ { "category": "self", "summary": "CVE-2023-5072", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5072.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1650575", "CSAFPID-1650515", "CSAFPID-1650835", "CSAFPID-89587", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-764250", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] } ], "title": "CVE-2023-5072" }, { "cve": "CVE-2023-26031", "cwe": { "id": "CWE-426", "name": "Untrusted Search Path" }, "notes": [ { "category": "other", "text": "Untrusted Search Path", "title": "CWE-426" } ], "product_status": { "known_affected": [ "CSAFPID-1673384", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2023-26031", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26031.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673384", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2023-26031" }, { "cve": "CVE-2023-26551", "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2023-26551", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26551.json" } ], "scores": [ { "cvss_v3": { "baseScore": 0.0, "baseSeverity": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2023-26551" }, { "cve": "CVE-2023-26552", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2023-26552", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26552.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2023-26552" }, { "cve": "CVE-2023-26553", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2023-26553", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26553.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2023-26553" }, { "cve": "CVE-2023-26554", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2023-26554", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26554.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2023-26554" }, { "cve": "CVE-2023-26555", "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2023-26555", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26555.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2023-26555" }, { "cve": "CVE-2023-28484", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "product_status": { "known_affected": [ "CSAFPID-764250", "CSAFPID-764731", "CSAFPID-764732", "CSAFPID-764733", "CSAFPID-220886", "CSAFPID-816317", "CSAFPID-764813", "CSAFPID-89587", "CSAFPID-342816", "CSAFPID-345049", "CSAFPID-764752", "CSAFPID-764764", "CSAFPID-764765", "CSAFPID-764766", "CSAFPID-764767", "CSAFPID-611390", "CSAFPID-611394", "CSAFPID-611417", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-220643", "CSAFPID-667692", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871" ] }, "references": [ { "category": "self", "summary": "CVE-2023-28484", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-28484.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-764250", "CSAFPID-764731", "CSAFPID-764732", "CSAFPID-764733", "CSAFPID-220886", "CSAFPID-816317", "CSAFPID-764813", "CSAFPID-89587", "CSAFPID-342816", "CSAFPID-345049", "CSAFPID-764752", "CSAFPID-764764", "CSAFPID-764765", "CSAFPID-764766", "CSAFPID-764767", "CSAFPID-611390", "CSAFPID-611394", "CSAFPID-611417", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-220643", "CSAFPID-667692", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871" ] } ], "title": "CVE-2023-28484" }, { "cve": "CVE-2023-29469", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "other", "text": "Double Free", "title": "CWE-415" } ], "product_status": { "known_affected": [ "CSAFPID-611417", "CSAFPID-764731", "CSAFPID-764732", "CSAFPID-764733", "CSAFPID-816317", "CSAFPID-89587", "CSAFPID-220886", "CSAFPID-342816", "CSAFPID-345049", "CSAFPID-764752", "CSAFPID-611390", "CSAFPID-611394", "CSAFPID-764764", "CSAFPID-764765", "CSAFPID-764766", "CSAFPID-764767", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-220643", "CSAFPID-667692", "CSAFPID-764813", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-764250", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871" ] }, "references": [ { "category": "self", "summary": "CVE-2023-29469", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-29469.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-611417", "CSAFPID-764731", "CSAFPID-764732", "CSAFPID-764733", "CSAFPID-816317", "CSAFPID-89587", "CSAFPID-220886", "CSAFPID-342816", "CSAFPID-345049", "CSAFPID-764752", "CSAFPID-611390", "CSAFPID-611394", "CSAFPID-764764", "CSAFPID-764765", "CSAFPID-764766", "CSAFPID-764767", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-220643", "CSAFPID-667692", "CSAFPID-764813", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-764250", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871" ] } ], "title": "CVE-2023-29469" }, { "cve": "CVE-2023-33201", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-764250", "CSAFPID-611394", "CSAFPID-1650584", "CSAFPID-1673397", "CSAFPID-912561", "CSAFPID-345049", "CSAFPID-611390", "CSAFPID-611417", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] }, "references": [ { "category": "self", "summary": "CVE-2023-33201", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-33201.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-764250", "CSAFPID-611394", "CSAFPID-1650584", "CSAFPID-1673397", "CSAFPID-912561", "CSAFPID-345049", "CSAFPID-611390", "CSAFPID-611417", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] } ], "title": "CVE-2023-33201" }, { "cve": "CVE-2023-37920", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "other", "text": "Improper Certificate Validation", "title": "CWE-295" }, { "category": "other", "text": "Insufficient Verification of Data Authenticity", "title": "CWE-345" } ], "product_status": { "known_affected": [ "CSAFPID-89587", "CSAFPID-1503575", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612" ] }, "references": [ { "category": "self", "summary": "CVE-2023-37920", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-37920.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587", "CSAFPID-1503575", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612" ] } ], "title": "CVE-2023-37920" }, { "cve": "CVE-2023-39410", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "notes": [ { "category": "other", "text": "Deserialization of Untrusted Data", "title": "CWE-502" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-1673404", "CSAFPID-1673384", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-764250", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871" ] }, "references": [ { "category": "self", "summary": "CVE-2023-39410", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-39410.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673404", "CSAFPID-1673384", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-764250", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871" ] } ], "title": "CVE-2023-39410" }, { "cve": "CVE-2023-44487", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1650757", "CSAFPID-1650758", "CSAFPID-1650759", "CSAFPID-1650760", "CSAFPID-1650761", "CSAFPID-89587", "CSAFPID-816361", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-667692", "CSAFPID-764250", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503603", "CSAFPID-1503575", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] }, "references": [ { "category": "self", "summary": "CVE-2023-44487", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-44487.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1650757", "CSAFPID-1650758", "CSAFPID-1650759", "CSAFPID-1650760", "CSAFPID-1650761", "CSAFPID-89587", "CSAFPID-816361", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-667692", "CSAFPID-764250", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503603", "CSAFPID-1503575", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] } ], "title": "CVE-2023-44487" }, { "cve": "CVE-2023-44981", "cwe": { "id": "CWE-639", "name": "Authorization Bypass Through User-Controlled Key" }, "notes": [ { "category": "other", "text": "Authorization Bypass Through User-Controlled Key", "title": "CWE-639" } ], "product_status": { "known_affected": [ "CSAFPID-1650515", "CSAFPID-89587", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-764250", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601" ] }, "references": [ { "category": "self", "summary": "CVE-2023-44981", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-44981.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1650515", "CSAFPID-89587", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-764250", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601" ] } ], "title": "CVE-2023-44981" }, { "cve": "CVE-2023-45288", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2023-45288", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-45288.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2023-45288" }, { "cve": "CVE-2023-48795", "cwe": { "id": "CWE-222", "name": "Truncation of Security-relevant Information" }, "notes": [ { "category": "other", "text": "Truncation of Security-relevant Information", "title": "CWE-222" } ], "product_status": { "known_affected": [ "CSAFPID-1650765", "CSAFPID-1650757", "CSAFPID-1650758", "CSAFPID-1650767", "CSAFPID-1650759", "CSAFPID-1650760", "CSAFPID-1650761", "CSAFPID-89587", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-764250", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-1503575", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] }, "references": [ { "category": "self", "summary": "CVE-2023-48795", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-48795.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1650765", "CSAFPID-1650757", "CSAFPID-1650758", "CSAFPID-1650767", "CSAFPID-1650759", "CSAFPID-1650760", "CSAFPID-1650761", "CSAFPID-89587", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-764250", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-1503575", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] } ], "title": "CVE-2023-48795" }, { "cve": "CVE-2023-49083", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "product_status": { "known_affected": [ "CSAFPID-89587", "CSAFPID-342816", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-816798", "CSAFPID-816801", "CSAFPID-816846", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-816845", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2023-49083", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-49083.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587", "CSAFPID-342816", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-816798", "CSAFPID-816801", "CSAFPID-816846", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-816845", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2023-49083" }, { "cve": "CVE-2023-51384", "cwe": { "id": "CWE-304", "name": "Missing Critical Step in Authentication" }, "notes": [ { "category": "other", "text": "Missing Critical Step in Authentication", "title": "CWE-304" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2023-51384", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-51384.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2023-51384" }, { "cve": "CVE-2023-51385", "cwe": { "id": "CWE-78", "name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "title": "CWE-78" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2023-51385", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-51385.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2023-51385" }, { "cve": "CVE-2023-52425", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-89587", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2023-52425", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52425.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2023-52425" }, { "cve": "CVE-2023-52426", "cwe": { "id": "CWE-776", "name": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)" }, "notes": [ { "category": "other", "text": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)", "title": "CWE-776" } ], "product_status": { "known_affected": [ "CSAFPID-89587", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2023-52426", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52426.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2023-52426" }, { "cve": "CVE-2024-1874", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "title": "CWE-77" }, { "category": "other", "text": "Improper Encoding or Escaping of Output", "title": "CWE-116" } ], "product_status": { "known_affected": [ "CSAFPID-1673422", "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-1874", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-1874.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673422", "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-1874" }, { "cve": "CVE-2024-2408", "cwe": { "id": "CWE-203", "name": "Observable Discrepancy" }, "notes": [ { "category": "other", "text": "Observable Discrepancy", "title": "CWE-203" }, { "category": "other", "text": "Observable Timing Discrepancy", "title": "CWE-208" }, { "category": "other", "text": "Use of a Broken or Risky Cryptographic Algorithm", "title": "CWE-327" }, { "category": "other", "text": "Covert Timing Channel", "title": "CWE-385" } ], "product_status": { "known_affected": [ "CSAFPID-1673422", "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-2408", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2408.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673422", "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-2408" }, { "cve": "CVE-2024-2511", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "other", "text": "Improperly Controlled Sequential Memory Allocation", "title": "CWE-1325" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-1673479", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-2511", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2511.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-1673479", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-2511" }, { "cve": "CVE-2024-4577", "cwe": { "id": "CWE-88", "name": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)", "title": "CWE-88" }, { "category": "other", "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "title": "CWE-78" } ], "product_status": { "known_affected": [ "CSAFPID-1673422", "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-4577", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4577.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673422", "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-4577" }, { "cve": "CVE-2024-4603", "cwe": { "id": "CWE-606", "name": "Unchecked Input for Loop Condition" }, "notes": [ { "category": "other", "text": "Unchecked Input for Loop Condition", "title": "CWE-606" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-1673479", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-4603", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4603.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-1673479", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-4603" }, { "cve": "CVE-2024-4741", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-1673479", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-4741", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4741.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-1673479", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-4741" }, { "cve": "CVE-2024-5458", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-1673422", "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-5458", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5458.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673422", "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-5458" }, { "cve": "CVE-2024-5535", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "other", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" } ], "product_status": { "known_affected": [ "CSAFPID-1673508", "CSAFPID-1673525" ] }, "references": [ { "category": "self", "summary": "CVE-2024-5535", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5535.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673508", "CSAFPID-1673525" ] } ], "title": "CVE-2024-5535" }, { "cve": "CVE-2024-5585", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "notes": [ { "category": "other", "text": "Improper Encoding or Escaping of Output", "title": "CWE-116" }, { "category": "other", "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "title": "CWE-78" }, { "category": "other", "text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)", "title": "CWE-88" } ], "product_status": { "known_affected": [ "CSAFPID-1673422", "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-5585", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5585.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673422", "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-5585" }, { "cve": "CVE-2024-6119", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "notes": [ { "category": "other", "text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "title": "CWE-843" } ], "product_status": { "known_affected": [ "CSAFPID-1673508", "CSAFPID-1673525" ] }, "references": [ { "category": "self", "summary": "CVE-2024-6119", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6119.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673508", "CSAFPID-1673525" ] } ], "title": "CVE-2024-6119" }, { "cve": "CVE-2024-6232", "cwe": { "id": "CWE-1333", "name": "Inefficient Regular Expression Complexity" }, "notes": [ { "category": "other", "text": "Inefficient Regular Expression Complexity", "title": "CWE-1333" } ], "references": [ { "category": "self", "summary": "CVE-2024-6232", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6232.json" } ], "title": "CVE-2024-6232" }, { "cve": "CVE-2024-7264", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-1673529", "CSAFPID-1673479", "CSAFPID-1673511", "CSAFPID-1673512" ] }, "references": [ { "category": "self", "summary": "CVE-2024-7264", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7264.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673529", "CSAFPID-1673479", "CSAFPID-1673511", "CSAFPID-1673512" ] } ], "title": "CVE-2024-7264" }, { "cve": "CVE-2024-7592", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "references": [ { "category": "self", "summary": "CVE-2024-7592", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7592.json" } ], "title": "CVE-2024-7592" }, { "cve": "CVE-2024-21131", "product_status": { "known_affected": [ "CSAFPID-1503299", "CSAFPID-1503306", "CSAFPID-1503302", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21131", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21131.json" } ], "title": "CVE-2024-21131" }, { "cve": "CVE-2024-21138", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "other", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" } ], "product_status": { "known_affected": [ "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21138", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21138.json" } ], "title": "CVE-2024-21138" }, { "cve": "CVE-2024-21140", "product_status": { "known_affected": [ "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503299", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21140", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21140.json" } ], "title": "CVE-2024-21140" }, { "cve": "CVE-2024-21144", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21144", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21144.json" } ], "title": "CVE-2024-21144" }, { "cve": "CVE-2024-21145", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-1503299", "CSAFPID-1503306", "CSAFPID-1503302", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21145", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21145.json" } ], "title": "CVE-2024-21145" }, { "cve": "CVE-2024-21147", "product_status": { "known_affected": [ "CSAFPID-1503306", "CSAFPID-1503302", "CSAFPID-1503299", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21147", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21147.json" } ], "title": "CVE-2024-21147" }, { "cve": "CVE-2024-21233", "product_status": { "known_affected": [ "CSAFPID-1673385", "CSAFPID-1673442", "CSAFPID-1673386" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21233", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21233.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-1673385", "CSAFPID-1673442", "CSAFPID-1673386" ] } ], "title": "CVE-2024-21233" }, { "cve": "CVE-2024-21242", "product_status": { "known_affected": [ "CSAFPID-1673443", "CSAFPID-1673444", "CSAFPID-1673445" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21242", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21242.json" } ], "scores": [ { "cvss_v3": { "baseScore": 3.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "CSAFPID-1673443", "CSAFPID-1673444", "CSAFPID-1673445" ] } ], "title": "CVE-2024-21242" }, { "cve": "CVE-2024-21251", "product_status": { "known_affected": [ "CSAFPID-1673450", "CSAFPID-1673451", "CSAFPID-1673452" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21251", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21251.json" } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-1673450", "CSAFPID-1673451", "CSAFPID-1673452" ] } ], "title": "CVE-2024-21251" }, { "cve": "CVE-2024-21261", "product_status": { "known_affected": [ "CSAFPID-1673144", "CSAFPID-1503575", "CSAFPID-1673188" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21261", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21261.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-1673144", "CSAFPID-1503575", "CSAFPID-1673188" ] } ], "title": "CVE-2024-21261" }, { "cve": "CVE-2024-22018", "cwe": { "id": "CWE-275", "name": "-" }, "notes": [ { "category": "other", "text": "CWE-275", "title": "CWE-275" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2024-22018", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22018.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2024-22018" }, { "cve": "CVE-2024-22020", "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2024-22020", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22020.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2024-22020" }, { "cve": "CVE-2024-22201", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1673384", "CSAFPID-342816", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-816798", "CSAFPID-816801", "CSAFPID-816846", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-816845", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-22201", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22201.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673384", "CSAFPID-342816", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-816798", "CSAFPID-816801", "CSAFPID-816846", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-816845", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-22201" }, { "cve": "CVE-2024-23807", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-1650831", "CSAFPID-1650825", "CSAFPID-1673479", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-23807", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23807.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1650831", "CSAFPID-1650825", "CSAFPID-1673479", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-23807" }, { "cve": "CVE-2024-23944", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-1673384", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-23944", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23944.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1673384", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-23944" }, { "cve": "CVE-2024-24989", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2024-24989", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24989.json" } ], "title": "CVE-2024-24989" }, { "cve": "CVE-2024-24990", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2024-24990", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24990.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2024-24990" }, { "cve": "CVE-2024-25710", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "other", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" } ], "product_status": { "known_affected": [ "CSAFPID-89587", "CSAFPID-1673384", "CSAFPID-816871", "CSAFPID-816798", "CSAFPID-816801", "CSAFPID-342816", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-816846", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-912046", "CSAFPID-1503640", "CSAFPID-816845", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-25710", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-25710.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587", "CSAFPID-1673384", "CSAFPID-816871", "CSAFPID-816798", "CSAFPID-816801", "CSAFPID-342816", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-816846", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-912046", "CSAFPID-1503640", "CSAFPID-816845", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-25710" }, { "cve": "CVE-2024-26130", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "product_status": { "known_affected": [ "CSAFPID-89587", "CSAFPID-342816", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-816798", "CSAFPID-816801", "CSAFPID-816846", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-816845", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-26130", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26130.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587", "CSAFPID-342816", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-816798", "CSAFPID-816801", "CSAFPID-816846", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-816845", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-26130" }, { "cve": "CVE-2024-26308", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-89587", "CSAFPID-1673384", "CSAFPID-816871", "CSAFPID-816798", "CSAFPID-342816", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-816801", "CSAFPID-816846", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-816845", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-26308", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26308.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587", "CSAFPID-1673384", "CSAFPID-816871", "CSAFPID-816798", "CSAFPID-342816", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-816801", "CSAFPID-816846", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-816845", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-26308" }, { "cve": "CVE-2024-27983", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-27983", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27983.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "products": [ "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-27983" }, { "cve": "CVE-2024-28182", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Detection of Error Condition Without Action", "title": "CWE-390" }, { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-1673442", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-28182", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28182.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673442", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-28182" }, { "cve": "CVE-2024-28849", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-89587", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-28849", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28849.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-89587", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-28849" }, { "cve": "CVE-2024-28887", "cwe": { "id": "CWE-427", "name": "Uncontrolled Search Path Element" }, "notes": [ { "category": "other", "text": "Uncontrolled Search Path Element", "title": "CWE-427" } ], "product_status": { "known_affected": [ "CSAFPID-1673385", "CSAFPID-1673442", "CSAFPID-1673386" ] }, "references": [ { "category": "self", "summary": "CVE-2024-28887", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28887.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673385", "CSAFPID-1673442", "CSAFPID-1673386" ] } ], "title": "CVE-2024-28887" }, { "cve": "CVE-2024-29025", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-1673488", "CSAFPID-1673489", "CSAFPID-1673491", "CSAFPID-1673492", "CSAFPID-1673493", "CSAFPID-1673495", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-29025", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29025.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-1673488", "CSAFPID-1673489", "CSAFPID-1673491", "CSAFPID-1673492", "CSAFPID-1673493", "CSAFPID-1673495", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-29025" }, { "cve": "CVE-2024-29131", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-1673497", "CSAFPID-1673397", "CSAFPID-1673384", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-29131", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29131.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-1673497", "CSAFPID-1673397", "CSAFPID-1673384", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-29131" }, { "cve": "CVE-2024-29133", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-1673497", "CSAFPID-1673397", "CSAFPID-1673384", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-29133", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29133.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-1673497", "CSAFPID-1673397", "CSAFPID-1673384", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-29133" }, { "cve": "CVE-2024-31079", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Stack-based Buffer Overflow", "title": "CWE-121" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2024-31079", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-31079.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2024-31079" }, { "cve": "CVE-2024-32760", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2024-32760", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-32760.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2024-32760" }, { "cve": "CVE-2024-34161", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "other", "text": "Missing Release of Memory after Effective Lifetime", "title": "CWE-401" }, { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2024-34161", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34161.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2024-34161" }, { "cve": "CVE-2024-34750", "cwe": { "id": "CWE-755", "name": "Improper Handling of Exceptional Conditions" }, "notes": [ { "category": "other", "text": "Improper Handling of Exceptional Conditions", "title": "CWE-755" }, { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1673504", "CSAFPID-1673506" ] }, "references": [ { "category": "self", "summary": "CVE-2024-34750", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34750.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673504", "CSAFPID-1673506" ] } ], "title": "CVE-2024-34750" }, { "cve": "CVE-2024-35200", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2024-35200", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35200.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2024-35200" }, { "cve": "CVE-2024-36137", "cwe": { "id": "CWE-275", "name": "-" }, "notes": [ { "category": "other", "text": "CWE-275", "title": "CWE-275" }, { "category": "other", "text": "Incorrect Permission Assignment for Critical Resource", "title": "CWE-732" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2024-36137", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36137.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2024-36137" }, { "cve": "CVE-2024-36138", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "title": "CWE-77" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2024-36138", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36138.json" } ], "title": "CVE-2024-36138" }, { "cve": "CVE-2024-36387", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-36387", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36387.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-36387" }, { "cve": "CVE-2024-37370", "cwe": { "id": "CWE-130", "name": "Improper Handling of Length Parameter Inconsistency" }, "notes": [ { "category": "other", "text": "Improper Handling of Length Parameter Inconsistency", "title": "CWE-130" } ], "product_status": { "known_affected": [ "CSAFPID-1673507", "CSAFPID-1673508", "CSAFPID-1673509" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37370", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37370.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673507", "CSAFPID-1673508", "CSAFPID-1673509" ] } ], "title": "CVE-2024-37370" }, { "cve": "CVE-2024-37371", "cwe": { "id": "CWE-130", "name": "Improper Handling of Length Parameter Inconsistency" }, "notes": [ { "category": "other", "text": "Improper Handling of Length Parameter Inconsistency", "title": "CWE-130" } ], "product_status": { "known_affected": [ "CSAFPID-1673507", "CSAFPID-1673508", "CSAFPID-1673509" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37371", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37371.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673507", "CSAFPID-1673508", "CSAFPID-1673509" ] } ], "title": "CVE-2024-37371" }, { "cve": "CVE-2024-37372", "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37372", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37372.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2024-37372" }, { "cve": "CVE-2024-38356", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" } ], "product_status": { "known_affected": [ "CSAFPID-1673510", "CSAFPID-1503575", "CSAFPID-1673188" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38356", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38356.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-1673510", "CSAFPID-1503575", "CSAFPID-1673188" ] } ], "title": "CVE-2024-38356" }, { "cve": "CVE-2024-38357", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" } ], "product_status": { "known_affected": [ "CSAFPID-1673510", "CSAFPID-1503575", "CSAFPID-1673188" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38357", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38357.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-1673510", "CSAFPID-1503575", "CSAFPID-1673188" ] } ], "title": "CVE-2024-38357" }, { "cve": "CVE-2024-38472", "cwe": { "id": "CWE-918", "name": "Server-Side Request Forgery (SSRF)" }, "notes": [ { "category": "other", "text": "Server-Side Request Forgery (SSRF)", "title": "CWE-918" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38472", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38472.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-38472" }, { "cve": "CVE-2024-38473", "cwe": { "id": "CWE-172", "name": "Encoding Error" }, "notes": [ { "category": "other", "text": "Encoding Error", "title": "CWE-172" }, { "category": "other", "text": "Improper Encoding or Escaping of Output", "title": "CWE-116" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38473", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38473.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-38473" }, { "cve": "CVE-2024-38474", "cwe": { "id": "CWE-172", "name": "Encoding Error" }, "notes": [ { "category": "other", "text": "Encoding Error", "title": "CWE-172" }, { "category": "other", "text": "Improper Encoding or Escaping of Output", "title": "CWE-116" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38474", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38474.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-38474" }, { "cve": "CVE-2024-38475", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "other", "text": "Improper Access Control", "title": "CWE-284" }, { "category": "other", "text": "Improper Encoding or Escaping of Output", "title": "CWE-116" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38475", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38475.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-38475" }, { "cve": "CVE-2024-38476", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "other", "text": "Inclusion of Functionality from Untrusted Control Sphere", "title": "CWE-829" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38476", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38476.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-38476" }, { "cve": "CVE-2024-38477", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38477", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38477.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-38477" }, { "cve": "CVE-2024-38998", "cwe": { "id": "CWE-1321", "name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)" }, "notes": [ { "category": "other", "text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)", "title": "CWE-1321" } ], "product_status": { "known_affected": [ "CSAFPID-1673511", "CSAFPID-1673512", "CSAFPID-1503575", "CSAFPID-1673188" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38998", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38998.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673511", "CSAFPID-1673512", "CSAFPID-1503575", "CSAFPID-1673188" ] } ], "title": "CVE-2024-38998" }, { "cve": "CVE-2024-38999", "cwe": { "id": "CWE-1321", "name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)" }, "notes": [ { "category": "other", "text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)", "title": "CWE-1321" } ], "product_status": { "known_affected": [ "CSAFPID-1673511", "CSAFPID-1673512", "CSAFPID-1503575", "CSAFPID-1673188" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38999", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38999.json" } ], "scores": [ { "cvss_v3": { "baseScore": 10.0, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673511", "CSAFPID-1673512", "CSAFPID-1503575", "CSAFPID-1673188" ] } ], "title": "CVE-2024-38999" }, { "cve": "CVE-2024-39573", "cwe": { "id": "CWE-918", "name": "Server-Side Request Forgery (SSRF)" }, "notes": [ { "category": "other", "text": "Server-Side Request Forgery (SSRF)", "title": "CWE-918" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-39573", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39573.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-39573" }, { "cve": "CVE-2024-39884", "cwe": { "id": "CWE-18", "name": "-" }, "notes": [ { "category": "other", "text": "CWE-18", "title": "CWE-18" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-39884", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39884.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-39884" }, { "cve": "CVE-2024-40725", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "other", "text": "Exposure of Resource to Wrong Sphere", "title": "CWE-668" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-1673479" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40725", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40725.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-1673479" ] } ], "title": "CVE-2024-40725" }, { "cve": "CVE-2024-40898", "cwe": { "id": "CWE-918", "name": "Server-Side Request Forgery (SSRF)" }, "notes": [ { "category": "other", "text": "Server-Side Request Forgery (SSRF)", "title": "CWE-918" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-1673479" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40898", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40898.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-1673479" ] } ], "title": "CVE-2024-40898" }, { "cve": "CVE-2024-45490", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" }, { "category": "other", "text": "Incorrect Calculation of Buffer Size", "title": "CWE-131" } ], "product_status": { "known_affected": [ "CSAFPID-1673385", "CSAFPID-1673442", "CSAFPID-1673386" ] }, "references": [ { "category": "self", "summary": "CVE-2024-45490", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45490.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673385", "CSAFPID-1673442", "CSAFPID-1673386" ] } ], "title": "CVE-2024-45490" }, { "cve": "CVE-2024-45491", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" } ], "product_status": { "known_affected": [ "CSAFPID-1673385", "CSAFPID-1673442", "CSAFPID-1673386" ] }, "references": [ { "category": "self", "summary": "CVE-2024-45491", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45491.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673385", "CSAFPID-1673442", "CSAFPID-1673386" ] } ], "title": "CVE-2024-45491" }, { "cve": "CVE-2024-45492", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" } ], "product_status": { "known_affected": [ "CSAFPID-1673385", "CSAFPID-1673442", "CSAFPID-1673386" ] }, "references": [ { "category": "self", "summary": "CVE-2024-45492", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45492.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673385", "CSAFPID-1673442", "CSAFPID-1673386" ] } ], "title": "CVE-2024-45492" }, { "cve": "CVE-2024-45801", "cwe": { "id": "CWE-1333", "name": "Inefficient Regular Expression Complexity" }, "notes": [ { "category": "other", "text": "Inefficient Regular Expression Complexity", "title": "CWE-1333" }, { "category": "other", "text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)", "title": "CWE-1321" } ], "product_status": { "known_affected": [ "CSAFPID-1503575", "CSAFPID-1673188" ] }, "references": [ { "category": "self", "summary": "CVE-2024-45801", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45801.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-1503575", "CSAFPID-1673188" ] } ], "title": "CVE-2024-45801" } ] }
NCSC-2024-0305
Vulnerability from csaf_ncscnl
Published
2024-07-17 13:55
Modified
2024-07-17 13:55
Summary
Kwetsbaarheden verholpen in Oracle Siebel CRM
Notes
The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:
NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.
NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.
This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.
Feiten
Er zijn kwetsbaarheden verholpen in Oracle Siebel CRM.
Interpretaties
Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorieën schade:
* Denial-of-Service (DoS)
* Toegang tot gevoelige gegevens
* Toegang tot systeemgegevens
* Manipulatie van gegevens
* (Remote) code execution (Gebruikersrechten)
Oplossingen
Oracle heeft updates beschikbaar gesteld om de kwetsbaarheden te verhelpen. Zie de referenties voor meer informatie.
Kans
medium
Schade
high
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE-1336
Improper Neutralization of Special Elements Used in a Template Engine
CWE-158
Improper Neutralization of Null Byte or NUL Character
CWE-192
Integer Coercion Error
CWE-20
Improper Input Validation
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE-295
Improper Certificate Validation
CWE-325
Missing Cryptographic Step
CWE-404
Improper Resource Shutdown or Release
CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
CWE-502
Deserialization of Untrusted Data
CWE-681
Incorrect Conversion between Numeric Types
CWE-754
Improper Check for Unusual or Exceptional Conditions
CWE-770
Allocation of Resources Without Limits or Throttling
CWE-787
Out-of-bounds Write
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "Er zijn kwetsbaarheden verholpen in Oracle Siebel CRM.", "title": "Feiten" }, { "category": "description", "text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n* Denial-of-Service (DoS)\n* Toegang tot gevoelige gegevens\n* Toegang tot systeemgegevens\n* Manipulatie van gegevens\n* (Remote) code execution (Gebruikersrechten)", "title": "Interpretaties" }, { "category": "description", "text": "Oracle heeft updates beschikbaar gesteld om de kwetsbaarheden te verhelpen. Zie de referenties voor meer informatie.", "title": "Oplossingen" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" }, { "category": "general", "text": "Improper Neutralization of Special Elements Used in a Template Engine", "title": "CWE-1336" }, { "category": "general", "text": "Improper Neutralization of Null Byte or NUL Character", "title": "CWE-158" }, { "category": "general", "text": "Integer Coercion Error", "title": "CWE-192" }, { "category": "general", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "general", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "general", "text": "Improper Certificate Validation", "title": "CWE-295" }, { "category": "general", "text": "Missing Cryptographic Step", "title": "CWE-325" }, { "category": "general", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "general", "text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)", "title": "CWE-444" }, { "category": "general", "text": "Deserialization of Untrusted Data", "title": "CWE-502" }, { "category": "general", "text": "Incorrect Conversion between Numeric Types", "title": "CWE-681" }, { "category": "general", "text": "Improper Check for Unusual or Exceptional Conditions", "title": "CWE-754" }, { "category": "general", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" }, { "category": "general", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "references": [ { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-36090" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-37434" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42003" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-22081" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-33201" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-41105" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-46589" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-47627" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5072" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5678" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5764" }, { "category": "external", "summary": "Reference - oracle", "url": "https://www.oracle.com/docs/tech/security-alerts/cpujul2024csaf.json" }, { "category": "external", "summary": "Reference - cveprojectv5; ibm; nvd; oracle", "url": "https://www.oracle.com/security-alerts/cpujul2024.html" } ], "title": "Kwetsbaarheden verholpen in Oracle Siebel CRM", "tracking": { "current_release_date": "2024-07-17T13:55:31.923970Z", "id": "NCSC-2024-0305", "initial_release_date": "2024-07-17T13:55:31.923970Z", "revision_history": [ { "date": "2024-07-17T13:55:31.923970Z", "number": "0", "summary": "Initiele versie" } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "siebel_crm_cloud_applications", "product": { "name": "siebel_crm_cloud_applications", "product_id": "CSAFPID-1503695", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:siebel_crm_cloud_applications:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "siebel_crm_deployment", "product": { "name": "siebel_crm_deployment", "product_id": "CSAFPID-1503697", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:siebel_crm_deployment:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "siebel_crm_end_user", "product": { "name": "siebel_crm_end_user", "product_id": "CSAFPID-1503700", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:siebel_crm_end_user:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "siebel_crm_integration", "product": { "name": "siebel_crm_integration", "product_id": "CSAFPID-1503702", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:siebel_crm_integration:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "siebel_crm", "product": { "name": "siebel_crm", "product_id": "CSAFPID-764293", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:siebel_crm:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "siebel_crm", "product": { "name": "siebel_crm", "product_id": "CSAFPID-345046", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:siebel_crm:23.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "siebel_crm", "product": { "name": "siebel_crm", "product_id": "CSAFPID-220191", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:siebel_crm:23.5:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "oracle" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-36090", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-764293", "CSAFPID-1503695", "CSAFPID-1503697", "CSAFPID-1503700", "CSAFPID-1503702" ] }, "references": [ { "category": "self", "summary": "CVE-2021-36090", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-36090.json" } ], "title": "CVE-2021-36090" }, { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "notes": [ { "category": "other", "text": "Integer Coercion Error", "title": "CWE-192" }, { "category": "other", "text": "Incorrect Conversion between Numeric Types", "title": "CWE-681" } ], "product_status": { "known_affected": [ "CSAFPID-764293", "CSAFPID-1503695", "CSAFPID-1503697", "CSAFPID-1503700", "CSAFPID-1503702" ] }, "references": [ { "category": "self", "summary": "CVE-2022-34169", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-34169.json" } ], "title": "CVE-2022-34169" }, { "cve": "CVE-2022-37434", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" }, { "category": "other", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" } ], "product_status": { "known_affected": [ "CSAFPID-764293", "CSAFPID-1503695", "CSAFPID-1503697", "CSAFPID-1503700", "CSAFPID-1503702" ] }, "references": [ { "category": "self", "summary": "CVE-2022-37434", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-37434.json" } ], "title": "CVE-2022-37434" }, { "cve": "CVE-2022-42003", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Deserialization of Untrusted Data", "title": "CWE-502" } ], "product_status": { "known_affected": [ "CSAFPID-764293", "CSAFPID-1503695", "CSAFPID-1503697", "CSAFPID-1503700", "CSAFPID-1503702" ] }, "references": [ { "category": "self", "summary": "CVE-2022-42003", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-42003.json" } ], "title": "CVE-2022-42003" }, { "cve": "CVE-2023-5072", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-764293", "CSAFPID-1503695", "CSAFPID-1503697", "CSAFPID-1503700", "CSAFPID-1503702" ] }, "references": [ { "category": "self", "summary": "CVE-2023-5072", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5072.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-764293", "CSAFPID-1503695", "CSAFPID-1503697", "CSAFPID-1503700", "CSAFPID-1503702" ] } ], "title": "CVE-2023-5072" }, { "cve": "CVE-2023-5678", "cwe": { "id": "CWE-754", "name": "Improper Check for Unusual or Exceptional Conditions" }, "notes": [ { "category": "other", "text": "Improper Check for Unusual or Exceptional Conditions", "title": "CWE-754" }, { "category": "other", "text": "Missing Cryptographic Step", "title": "CWE-325" } ], "product_status": { "known_affected": [ "CSAFPID-1503695", "CSAFPID-1503697", "CSAFPID-1503700", "CSAFPID-1503702" ] }, "references": [ { "category": "self", "summary": "CVE-2023-5678", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5678.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1503695", "CSAFPID-1503697", "CSAFPID-1503700", "CSAFPID-1503702" ] } ], "title": "CVE-2023-5678" }, { "cve": "CVE-2023-5764", "cwe": { "id": "CWE-1336", "name": "Improper Neutralization of Special Elements Used in a Template Engine" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Special Elements Used in a Template Engine", "title": "CWE-1336" } ], "product_status": { "known_affected": [ "CSAFPID-1503695", "CSAFPID-1503697", "CSAFPID-1503700", "CSAFPID-1503702" ] }, "references": [ { "category": "self", "summary": "CVE-2023-5764", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5764.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1503695", "CSAFPID-1503697", "CSAFPID-1503700", "CSAFPID-1503702" ] } ], "title": "CVE-2023-5764" }, { "cve": "CVE-2023-22081", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "other", "text": "Improper Certificate Validation", "title": "CWE-295" } ], "product_status": { "known_affected": [ "CSAFPID-764293", "CSAFPID-1503695", "CSAFPID-1503697", "CSAFPID-1503700", "CSAFPID-1503702" ] }, "references": [ { "category": "self", "summary": "CVE-2023-22081", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-22081.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "CSAFPID-764293", "CSAFPID-1503695", "CSAFPID-1503697", "CSAFPID-1503700", "CSAFPID-1503702" ] } ], "title": "CVE-2023-22081" }, { "cve": "CVE-2023-33201", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-764293", "CSAFPID-1503695", "CSAFPID-1503697", "CSAFPID-1503700", "CSAFPID-1503702" ] }, "references": [ { "category": "self", "summary": "CVE-2023-33201", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-33201.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-764293", "CSAFPID-1503695", "CSAFPID-1503697", "CSAFPID-1503700", "CSAFPID-1503702" ] } ], "title": "CVE-2023-33201" }, { "cve": "CVE-2023-41105", "cwe": { "id": "CWE-158", "name": "Improper Neutralization of Null Byte or NUL Character" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Null Byte or NUL Character", "title": "CWE-158" } ], "product_status": { "known_affected": [ "CSAFPID-764293", "CSAFPID-1503695", "CSAFPID-1503697", "CSAFPID-1503700", "CSAFPID-1503702" ] }, "references": [ { "category": "self", "summary": "CVE-2023-41105", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-41105.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-764293", "CSAFPID-1503695", "CSAFPID-1503697", "CSAFPID-1503700", "CSAFPID-1503702" ] } ], "title": "CVE-2023-41105" }, { "cve": "CVE-2023-46589", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "notes": [ { "category": "other", "text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)", "title": "CWE-444" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-764293", "CSAFPID-1503695", "CSAFPID-1503697", "CSAFPID-1503700", "CSAFPID-1503702" ] }, "references": [ { "category": "self", "summary": "CVE-2023-46589", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46589.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-764293", "CSAFPID-1503695", "CSAFPID-1503697", "CSAFPID-1503700", "CSAFPID-1503702" ] } ], "title": "CVE-2023-46589" }, { "cve": "CVE-2023-47627", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "notes": [ { "category": "other", "text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)", "title": "CWE-444" } ], "product_status": { "known_affected": [ "CSAFPID-1503695", "CSAFPID-1503697", "CSAFPID-1503700", "CSAFPID-1503702" ] }, "references": [ { "category": "self", "summary": "CVE-2023-47627", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-47627.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1503695", "CSAFPID-1503697", "CSAFPID-1503700", "CSAFPID-1503702" ] } ], "title": "CVE-2023-47627" } ] }
ncsc-2024-0305
Vulnerability from csaf_ncscnl
Published
2024-07-17 13:55
Modified
2024-07-17 13:55
Summary
Kwetsbaarheden verholpen in Oracle Siebel CRM
Notes
The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:
NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.
NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.
This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.
Feiten
Er zijn kwetsbaarheden verholpen in Oracle Siebel CRM.
Interpretaties
Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorieën schade:
* Denial-of-Service (DoS)
* Toegang tot gevoelige gegevens
* Toegang tot systeemgegevens
* Manipulatie van gegevens
* (Remote) code execution (Gebruikersrechten)
Oplossingen
Oracle heeft updates beschikbaar gesteld om de kwetsbaarheden te verhelpen. Zie de referenties voor meer informatie.
Kans
medium
Schade
high
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE-1336
Improper Neutralization of Special Elements Used in a Template Engine
CWE-158
Improper Neutralization of Null Byte or NUL Character
CWE-192
Integer Coercion Error
CWE-20
Improper Input Validation
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE-295
Improper Certificate Validation
CWE-325
Missing Cryptographic Step
CWE-404
Improper Resource Shutdown or Release
CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
CWE-502
Deserialization of Untrusted Data
CWE-681
Incorrect Conversion between Numeric Types
CWE-754
Improper Check for Unusual or Exceptional Conditions
CWE-770
Allocation of Resources Without Limits or Throttling
CWE-787
Out-of-bounds Write
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "Er zijn kwetsbaarheden verholpen in Oracle Siebel CRM.", "title": "Feiten" }, { "category": "description", "text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n* Denial-of-Service (DoS)\n* Toegang tot gevoelige gegevens\n* Toegang tot systeemgegevens\n* Manipulatie van gegevens\n* (Remote) code execution (Gebruikersrechten)", "title": "Interpretaties" }, { "category": "description", "text": "Oracle heeft updates beschikbaar gesteld om de kwetsbaarheden te verhelpen. Zie de referenties voor meer informatie.", "title": "Oplossingen" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" }, { "category": "general", "text": "Improper Neutralization of Special Elements Used in a Template Engine", "title": "CWE-1336" }, { "category": "general", "text": "Improper Neutralization of Null Byte or NUL Character", "title": "CWE-158" }, { "category": "general", "text": "Integer Coercion Error", "title": "CWE-192" }, { "category": "general", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "general", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "general", "text": "Improper Certificate Validation", "title": "CWE-295" }, { "category": "general", "text": "Missing Cryptographic Step", "title": "CWE-325" }, { "category": "general", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "general", "text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)", "title": "CWE-444" }, { "category": "general", "text": "Deserialization of Untrusted Data", "title": "CWE-502" }, { "category": "general", "text": "Incorrect Conversion between Numeric Types", "title": "CWE-681" }, { "category": "general", "text": "Improper Check for Unusual or Exceptional Conditions", "title": "CWE-754" }, { "category": "general", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" }, { "category": "general", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "references": [ { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-36090" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-37434" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42003" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-22081" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-33201" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-41105" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-46589" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-47627" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5072" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5678" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5764" }, { "category": "external", "summary": "Reference - oracle", "url": "https://www.oracle.com/docs/tech/security-alerts/cpujul2024csaf.json" }, { "category": "external", "summary": "Reference - cveprojectv5; ibm; nvd; oracle", "url": "https://www.oracle.com/security-alerts/cpujul2024.html" } ], "title": "Kwetsbaarheden verholpen in Oracle Siebel CRM", "tracking": { "current_release_date": "2024-07-17T13:55:31.923970Z", "id": "NCSC-2024-0305", "initial_release_date": "2024-07-17T13:55:31.923970Z", "revision_history": [ { "date": "2024-07-17T13:55:31.923970Z", "number": "0", "summary": "Initiele versie" } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "siebel_crm_cloud_applications", "product": { "name": "siebel_crm_cloud_applications", "product_id": "CSAFPID-1503695", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:siebel_crm_cloud_applications:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "siebel_crm_deployment", "product": { "name": "siebel_crm_deployment", "product_id": "CSAFPID-1503697", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:siebel_crm_deployment:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "siebel_crm_end_user", "product": { "name": "siebel_crm_end_user", "product_id": "CSAFPID-1503700", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:siebel_crm_end_user:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "siebel_crm_integration", "product": { "name": "siebel_crm_integration", "product_id": "CSAFPID-1503702", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:siebel_crm_integration:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "siebel_crm", "product": { "name": "siebel_crm", "product_id": "CSAFPID-764293", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:siebel_crm:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "siebel_crm", "product": { "name": "siebel_crm", "product_id": "CSAFPID-345046", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:siebel_crm:23.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "siebel_crm", "product": { "name": "siebel_crm", "product_id": "CSAFPID-220191", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:siebel_crm:23.5:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "oracle" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-36090", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-764293", "CSAFPID-1503695", "CSAFPID-1503697", "CSAFPID-1503700", "CSAFPID-1503702" ] }, "references": [ { "category": "self", "summary": "CVE-2021-36090", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-36090.json" } ], "title": "CVE-2021-36090" }, { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "notes": [ { "category": "other", "text": "Integer Coercion Error", "title": "CWE-192" }, { "category": "other", "text": "Incorrect Conversion between Numeric Types", "title": "CWE-681" } ], "product_status": { "known_affected": [ "CSAFPID-764293", "CSAFPID-1503695", "CSAFPID-1503697", "CSAFPID-1503700", "CSAFPID-1503702" ] }, "references": [ { "category": "self", "summary": "CVE-2022-34169", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-34169.json" } ], "title": "CVE-2022-34169" }, { "cve": "CVE-2022-37434", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" }, { "category": "other", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" } ], "product_status": { "known_affected": [ "CSAFPID-764293", "CSAFPID-1503695", "CSAFPID-1503697", "CSAFPID-1503700", "CSAFPID-1503702" ] }, "references": [ { "category": "self", "summary": "CVE-2022-37434", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-37434.json" } ], "title": "CVE-2022-37434" }, { "cve": "CVE-2022-42003", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Deserialization of Untrusted Data", "title": "CWE-502" } ], "product_status": { "known_affected": [ "CSAFPID-764293", "CSAFPID-1503695", "CSAFPID-1503697", "CSAFPID-1503700", "CSAFPID-1503702" ] }, "references": [ { "category": "self", "summary": "CVE-2022-42003", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-42003.json" } ], "title": "CVE-2022-42003" }, { "cve": "CVE-2023-5072", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-764293", "CSAFPID-1503695", "CSAFPID-1503697", "CSAFPID-1503700", "CSAFPID-1503702" ] }, "references": [ { "category": "self", "summary": "CVE-2023-5072", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5072.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-764293", "CSAFPID-1503695", "CSAFPID-1503697", "CSAFPID-1503700", "CSAFPID-1503702" ] } ], "title": "CVE-2023-5072" }, { "cve": "CVE-2023-5678", "cwe": { "id": "CWE-754", "name": "Improper Check for Unusual or Exceptional Conditions" }, "notes": [ { "category": "other", "text": "Improper Check for Unusual or Exceptional Conditions", "title": "CWE-754" }, { "category": "other", "text": "Missing Cryptographic Step", "title": "CWE-325" } ], "product_status": { "known_affected": [ "CSAFPID-1503695", "CSAFPID-1503697", "CSAFPID-1503700", "CSAFPID-1503702" ] }, "references": [ { "category": "self", "summary": "CVE-2023-5678", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5678.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1503695", "CSAFPID-1503697", "CSAFPID-1503700", "CSAFPID-1503702" ] } ], "title": "CVE-2023-5678" }, { "cve": "CVE-2023-5764", "cwe": { "id": "CWE-1336", "name": "Improper Neutralization of Special Elements Used in a Template Engine" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Special Elements Used in a Template Engine", "title": "CWE-1336" } ], "product_status": { "known_affected": [ "CSAFPID-1503695", "CSAFPID-1503697", "CSAFPID-1503700", "CSAFPID-1503702" ] }, "references": [ { "category": "self", "summary": "CVE-2023-5764", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5764.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1503695", "CSAFPID-1503697", "CSAFPID-1503700", "CSAFPID-1503702" ] } ], "title": "CVE-2023-5764" }, { "cve": "CVE-2023-22081", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "other", "text": "Improper Certificate Validation", "title": "CWE-295" } ], "product_status": { "known_affected": [ "CSAFPID-764293", "CSAFPID-1503695", "CSAFPID-1503697", "CSAFPID-1503700", "CSAFPID-1503702" ] }, "references": [ { "category": "self", "summary": "CVE-2023-22081", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-22081.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "CSAFPID-764293", "CSAFPID-1503695", "CSAFPID-1503697", "CSAFPID-1503700", "CSAFPID-1503702" ] } ], "title": "CVE-2023-22081" }, { "cve": "CVE-2023-33201", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-764293", "CSAFPID-1503695", "CSAFPID-1503697", "CSAFPID-1503700", "CSAFPID-1503702" ] }, "references": [ { "category": "self", "summary": "CVE-2023-33201", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-33201.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-764293", "CSAFPID-1503695", "CSAFPID-1503697", "CSAFPID-1503700", "CSAFPID-1503702" ] } ], "title": "CVE-2023-33201" }, { "cve": "CVE-2023-41105", "cwe": { "id": "CWE-158", "name": "Improper Neutralization of Null Byte or NUL Character" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Null Byte or NUL Character", "title": "CWE-158" } ], "product_status": { "known_affected": [ "CSAFPID-764293", "CSAFPID-1503695", "CSAFPID-1503697", "CSAFPID-1503700", "CSAFPID-1503702" ] }, "references": [ { "category": "self", "summary": "CVE-2023-41105", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-41105.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-764293", "CSAFPID-1503695", "CSAFPID-1503697", "CSAFPID-1503700", "CSAFPID-1503702" ] } ], "title": "CVE-2023-41105" }, { "cve": "CVE-2023-46589", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "notes": [ { "category": "other", "text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)", "title": "CWE-444" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-764293", "CSAFPID-1503695", "CSAFPID-1503697", "CSAFPID-1503700", "CSAFPID-1503702" ] }, "references": [ { "category": "self", "summary": "CVE-2023-46589", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46589.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-764293", "CSAFPID-1503695", "CSAFPID-1503697", "CSAFPID-1503700", "CSAFPID-1503702" ] } ], "title": "CVE-2023-46589" }, { "cve": "CVE-2023-47627", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "notes": [ { "category": "other", "text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)", "title": "CWE-444" } ], "product_status": { "known_affected": [ "CSAFPID-1503695", "CSAFPID-1503697", "CSAFPID-1503700", "CSAFPID-1503702" ] }, "references": [ { "category": "self", "summary": "CVE-2023-47627", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-47627.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1503695", "CSAFPID-1503697", "CSAFPID-1503700", "CSAFPID-1503702" ] } ], "title": "CVE-2023-47627" } ] }
ncsc-2024-0306
Vulnerability from csaf_ncscnl
Published
2024-07-17 13:55
Modified
2024-07-17 13:55
Summary
Kwetsbaarheden verholpen in Oracle Supply Chain
Notes
The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:
NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.
NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.
This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.
Feiten
Er zijn kwetsbaarheden verholpen in Oracle Supply Chain.
Interpretaties
Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorieën schade:
* Denial-of-Service (DoS)
* Toegang tot gevoelige gegevens
* Toegang tot systeemgegevens
* Manipulatie van gegevens
* (Remote) code execution (Gebruikersrechten)
Oplossingen
Oracle heeft updates beschikbaar gesteld om de kwetsbaarheden te verhelpen. Zie de referenties voor meer informatie.
Kans
medium
Schade
high
CWE-192
Integer Coercion Error
CWE-20
Improper Input Validation
CWE-400
Uncontrolled Resource Consumption
CWE-404
Improper Resource Shutdown or Release
CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
CWE-681
Incorrect Conversion between Numeric Types
CWE-770
Allocation of Resources Without Limits or Throttling
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "Er zijn kwetsbaarheden verholpen in Oracle Supply Chain.", "title": "Feiten" }, { "category": "description", "text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n* Denial-of-Service (DoS)\n* Toegang tot gevoelige gegevens\n* Toegang tot systeemgegevens\n* Manipulatie van gegevens\n* (Remote) code execution (Gebruikersrechten)", "title": "Interpretaties" }, { "category": "description", "text": "Oracle heeft updates beschikbaar gesteld om de kwetsbaarheden te verhelpen. Zie de referenties voor meer informatie.", "title": "Oplossingen" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Integer Coercion Error", "title": "CWE-192" }, { "category": "general", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "general", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "general", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "general", "text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)", "title": "CWE-444" }, { "category": "general", "text": "Incorrect Conversion between Numeric Types", "title": "CWE-681" }, { "category": "general", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "references": [ { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-24998" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-37536" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-46589" }, { "category": "external", "summary": "Reference - oracle", "url": "https://www.oracle.com/docs/tech/security-alerts/cpujul2024csaf.json" }, { "category": "external", "summary": "Reference - cveprojectv5; ibm; nvd; oracle", "url": "https://www.oracle.com/security-alerts/cpujul2024.html" } ], "title": " Kwetsbaarheden verholpen in Oracle Supply Chain", "tracking": { "current_release_date": "2024-07-17T13:55:37.062720Z", "id": "NCSC-2024-0306", "initial_release_date": "2024-07-17T13:55:37.062720Z", "revision_history": [ { "date": "2024-07-17T13:55:37.062720Z", "number": "0", "summary": "Initiele versie" } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "agile_engineering_data_management", "product": { "name": "agile_engineering_data_management", "product_id": "CSAFPID-764768", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:agile_engineering_data_management:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "autovue_for_agile_product_lifecycle_management", "product": { "name": "autovue_for_agile_product_lifecycle_management", "product_id": "CSAFPID-2302", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:autovue_for_agile_product_lifecycle_management:21.0.2:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "oracle" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "notes": [ { "category": "other", "text": "Integer Coercion Error", "title": "CWE-192" }, { "category": "other", "text": "Incorrect Conversion between Numeric Types", "title": "CWE-681" } ], "product_status": { "known_affected": [ "CSAFPID-2302", "CSAFPID-764768" ] }, "references": [ { "category": "self", "summary": "CVE-2022-34169", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-34169.json" } ], "title": "CVE-2022-34169" }, { "cve": "CVE-2023-24998", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-2302", "CSAFPID-764768" ] }, "references": [ { "category": "self", "summary": "CVE-2023-24998", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-24998.json" } ], "title": "CVE-2023-24998" }, { "cve": "CVE-2023-37536", "product_status": { "known_affected": [ "CSAFPID-764768", "CSAFPID-2302" ] }, "references": [ { "category": "self", "summary": "CVE-2023-37536", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-37536.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-764768", "CSAFPID-2302" ] } ], "title": "CVE-2023-37536" }, { "cve": "CVE-2023-44487", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-764768", "CSAFPID-2302" ] }, "references": [ { "category": "self", "summary": "CVE-2023-44487", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-44487.json" } ], "title": "CVE-2023-44487" }, { "cve": "CVE-2023-46589", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "notes": [ { "category": "other", "text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)", "title": "CWE-444" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-764768", "CSAFPID-2302" ] }, "references": [ { "category": "self", "summary": "CVE-2023-46589", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46589.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-764768", "CSAFPID-2302" ] } ], "title": "CVE-2023-46589" } ] }
NCSC-2024-0411
Vulnerability from csaf_ncscnl
Published
2024-10-17 13:15
Modified
2024-10-17 13:15
Summary
Kwetsbaarheden verholpen in Oracle Database producten
Notes
The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:
NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.
NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.
This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.
Feiten
Oracle heeft kwetsbaarheden verholpen in diverse Database producten en subsystemen, zoals de Core database, Application Express, Autonomous Health Framework, Essbase, GoldenGate, SQL Developer en Secure Backup.
Interpretaties
Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorieën schade:
- Denial-of-Service (DoS)
- Manipuleren van data
- Toegang tot gevoelige gegevens
Oplossingen
Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.
Kans
medium
Schade
high
CWE-130
Improper Handling of Length Parameter Inconsistency
CWE-208
Observable Timing Discrepancy
CWE-776
Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')
CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
CWE-755
Improper Handling of Exceptional Conditions
CWE-834
Excessive Iteration
CWE-407
Inefficient Algorithmic Complexity
CWE-178
Improper Handling of Case Sensitivity
CWE-732
Incorrect Permission Assignment for Critical Resource
CWE-415
Double Free
CWE-311
Missing Encryption of Sensitive Data
CWE-427
Uncontrolled Search Path Element
CWE-172
Encoding Error
CWE-680
Integer Overflow to Buffer Overflow
CWE-426
Untrusted Search Path
CWE-843
Access of Resource Using Incompatible Type ('Type Confusion')
CWE-116
Improper Encoding or Escaping of Output
CWE-345
Insufficient Verification of Data Authenticity
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CWE-203
Observable Discrepancy
CWE-190
Integer Overflow or Wraparound
CWE-552
Files or Directories Accessible to External Parties
CWE-639
Authorization Bypass Through User-Controlled Key
CWE-125
Out-of-bounds Read
CWE-404
Improper Resource Shutdown or Release
CWE-275
CWE-275
CWE-284
Improper Access Control
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE-1333
Inefficient Regular Expression Complexity
CWE-1321
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
CWE-416
Use After Free
CWE-401
Missing Release of Memory after Effective Lifetime
CWE-476
NULL Pointer Dereference
CWE-295
Improper Certificate Validation
CWE-668
Exposure of Resource to Wrong Sphere
CWE-829
Inclusion of Functionality from Untrusted Control Sphere
CWE-327
Use of a Broken or Risky Cryptographic Algorithm
CWE-400
Uncontrolled Resource Consumption
CWE-770
Allocation of Resources Without Limits or Throttling
CWE-502
Deserialization of Untrusted Data
CWE-918
Server-Side Request Forgery (SSRF)
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CWE-787
Out-of-bounds Write
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE-122
Heap-based Buffer Overflow
CWE-121
Stack-based Buffer Overflow
CWE-681
Incorrect Conversion between Numeric Types
CWE-835
Loop with Unreachable Exit Condition ('Infinite Loop')
CWE-269
Improper Privilege Management
CWE-20
Improper Input Validation
CWE-87
Improper Neutralization of Alternate XSS Syntax
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CWE-18
CWE-18
CWE-385
Covert Timing Channel
CWE-606
Unchecked Input for Loop Condition
CWE-192
Integer Coercion Error
CWE-390
Detection of Error Condition Without Action
CWE-1325
Improperly Controlled Sequential Memory Allocation
CWE-222
Truncation of Security-relevant Information
CWE-131
Incorrect Calculation of Buffer Size
CWE-59
Improper Link Resolution Before File Access ('Link Following')
CWE-304
Missing Critical Step in Authentication
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "Oracle heeft kwetsbaarheden verholpen in diverse Database producten en subsystemen, zoals de Core database, Application Express, Autonomous Health Framework, Essbase, GoldenGate, SQL Developer en Secure Backup.", "title": "Feiten" }, { "category": "description", "text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Denial-of-Service (DoS)\n- Manipuleren van data\n- Toegang tot gevoelige gegevens", "title": "Interpretaties" }, { "category": "description", "text": "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.", "title": "Oplossingen" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Improper Handling of Length Parameter Inconsistency", "title": "CWE-130" }, { "category": "general", "text": "Observable Timing Discrepancy", "title": "CWE-208" }, { "category": "general", "text": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)", "title": "CWE-776" }, { "category": "general", "text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)", "title": "CWE-88" }, { "category": "general", "text": "Improper Handling of Exceptional Conditions", "title": "CWE-755" }, { "category": "general", "text": "Excessive Iteration", "title": "CWE-834" }, { "category": "general", "text": "Inefficient Algorithmic Complexity", "title": "CWE-407" }, { "category": "general", "text": "Improper Handling of Case Sensitivity", "title": "CWE-178" }, { "category": "general", "text": "Incorrect Permission Assignment for Critical Resource", "title": "CWE-732" }, { "category": "general", "text": "Double Free", "title": "CWE-415" }, { "category": "general", "text": "Missing Encryption of Sensitive Data", "title": "CWE-311" }, { "category": "general", "text": "Uncontrolled Search Path Element", "title": "CWE-427" }, { "category": "general", "text": "Encoding Error", "title": "CWE-172" }, { "category": "general", "text": "Integer Overflow to Buffer Overflow", "title": "CWE-680" }, { "category": "general", "text": "Untrusted Search Path", "title": "CWE-426" }, { "category": "general", "text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "title": "CWE-843" }, { "category": "general", "text": "Improper Encoding or Escaping of Output", "title": "CWE-116" }, { "category": "general", "text": "Insufficient Verification of Data Authenticity", "title": "CWE-345" }, { "category": "general", "text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "title": "CWE-77" }, { "category": "general", "text": "Observable Discrepancy", "title": "CWE-203" }, { "category": "general", "text": "Integer Overflow or Wraparound", "title": "CWE-190" }, { "category": "general", "text": "Files or Directories Accessible to External Parties", "title": "CWE-552" }, { "category": "general", "text": "Authorization Bypass Through User-Controlled Key", "title": "CWE-639" }, { "category": "general", "text": "Out-of-bounds Read", "title": "CWE-125" }, { "category": "general", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "general", "text": "CWE-275", "title": "CWE-275" }, { "category": "general", "text": "Improper Access Control", "title": "CWE-284" }, { "category": "general", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" }, { "category": "general", "text": "Inefficient Regular Expression Complexity", "title": "CWE-1333" }, { "category": "general", "text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)", "title": "CWE-1321" }, { "category": "general", "text": "Use After Free", "title": "CWE-416" }, { "category": "general", "text": "Missing Release of Memory after Effective Lifetime", "title": "CWE-401" }, { "category": "general", "text": "NULL Pointer Dereference", "title": "CWE-476" }, { "category": "general", "text": "Improper Certificate Validation", "title": "CWE-295" }, { "category": "general", "text": "Exposure of Resource to Wrong Sphere", "title": "CWE-668" }, { "category": "general", "text": "Inclusion of Functionality from Untrusted Control Sphere", "title": "CWE-829" }, { "category": "general", "text": "Use of a Broken or Risky Cryptographic Algorithm", "title": "CWE-327" }, { "category": "general", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "general", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" }, { "category": "general", "text": "Deserialization of Untrusted Data", "title": "CWE-502" }, { "category": "general", "text": "Server-Side Request Forgery (SSRF)", "title": "CWE-918" }, { "category": "general", "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "title": "CWE-78" }, { "category": "general", "text": "Out-of-bounds Write", "title": "CWE-787" }, { "category": "general", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "general", "text": "Heap-based Buffer Overflow", "title": "CWE-122" }, { "category": "general", "text": "Stack-based Buffer Overflow", "title": "CWE-121" }, { "category": "general", "text": "Incorrect Conversion between Numeric Types", "title": "CWE-681" }, { "category": "general", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" }, { "category": "general", "text": "Improper Privilege Management", "title": "CWE-269" }, { "category": "general", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "general", "text": "Improper Neutralization of Alternate XSS Syntax", "title": "CWE-87" }, { "category": "general", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" }, { "category": "general", "text": "CWE-18", "title": "CWE-18" }, { "category": "general", "text": "Covert Timing Channel", "title": "CWE-385" }, { "category": "general", "text": "Unchecked Input for Loop Condition", "title": "CWE-606" }, { "category": "general", "text": "Integer Coercion Error", "title": "CWE-192" }, { "category": "general", "text": "Detection of Error Condition Without Action", "title": "CWE-390" }, { "category": "general", "text": "Improperly Controlled Sequential Memory Allocation", "title": "CWE-1325" }, { "category": "general", "text": "Truncation of Security-relevant Information", "title": "CWE-222" }, { "category": "general", "text": "Incorrect Calculation of Buffer Size", "title": "CWE-131" }, { "category": "general", "text": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)", "title": "CWE-59" }, { "category": "general", "text": "Missing Critical Step in Authentication", "title": "CWE-304" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "references": [ { "category": "external", "summary": "Reference - cveprojectv5; hkcert; nvd; oracle; redhat", "url": "https://www.oracle.com/security-alerts/cpuoct2024.html" } ], "title": "Kwetsbaarheden verholpen in Oracle Database producten", "tracking": { "current_release_date": "2024-10-17T13:15:19.595269Z", "id": "NCSC-2024-0411", "initial_release_date": "2024-10-17T13:15:19.595269Z", "revision_history": [ { "date": "2024-10-17T13:15:19.595269Z", "number": "0", "summary": "Initiele versie" } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "database_-_grid", "product": { "name": "database_-_grid", "product_id": "CSAFPID-1673504", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_grid:19.3-19.24:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_grid", "product": { "name": "database_-_grid", "product_id": "CSAFPID-1673506", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_grid:21.3-21.15:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_core", "product": { "name": "database_-_core", "product_id": "CSAFPID-1673386", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_core:19.3-19.24:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_core", "product": { "name": "database_-_core", "product_id": "CSAFPID-1673385", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_core:21.3-21.15:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_core", "product": { "name": "database_-_core", "product_id": "CSAFPID-1673442", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_core:23.4-23.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_security", "product": { "name": "database_-_security", "product_id": "CSAFPID-1673507", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_security:19.3-19.24:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_security", "product": { "name": "database_-_security", "product_id": "CSAFPID-1673509", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_security:21.3-21.15:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_security", "product": { "name": "database_-_security", "product_id": "CSAFPID-1673508", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_security:23.4-23.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "spatial_and_graph_mapviewer", "product": { "name": "spatial_and_graph_mapviewer", "product_id": "CSAFPID-912561", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:spatial_and_graph_mapviewer:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "spatial_and_graph", "product": { "name": "spatial_and_graph", "product_id": "CSAFPID-764250", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:spatial_and_graph:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "spatial_and_graph", "product": { "name": "spatial_and_graph", "product_id": "CSAFPID-1673511", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:spatial_and_graph:19.3-19.24:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "spatial_and_graph", "product": { "name": "spatial_and_graph", "product_id": "CSAFPID-1673512", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:spatial_and_graph:21.3-21.15:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "spatial_and_graph", "product": { "name": "spatial_and_graph", "product_id": "CSAFPID-816800", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:spatial_and_graph:23.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "spatial_and_graph", "product": { "name": "spatial_and_graph", "product_id": "CSAFPID-1673529", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:spatial_and_graph:23.4-23.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fleet_patching_and_provisioning_-_micronaut", "product": { "name": "fleet_patching_and_provisioning_-_micronaut", "product_id": "CSAFPID-1673492", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:fleet_patching_and_provisioning_-_micronaut:23.4-23.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fleet_patching_and_provisioning", "product": { "name": "fleet_patching_and_provisioning", "product_id": "CSAFPID-1503603", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:fleet_patching_and_provisioning:23.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_xml_database", "product": { "name": "database_-_xml_database", "product_id": "CSAFPID-1673445", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_xml_database:19.3-19.24:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_xml_database", "product": { "name": "database_-_xml_database", "product_id": "CSAFPID-1673443", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_xml_database:21.3-21.15:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_xml_database", "product": { "name": "database_-_xml_database", "product_id": "CSAFPID-1673444", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_xml_database:23.4-23.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_java_vm", "product": { "name": "database_-_java_vm", "product_id": "CSAFPID-1673451", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_java_vm:19.3-19.24:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_java_vm", "product": { "name": "database_-_java_vm", "product_id": "CSAFPID-1673450", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_java_vm:21.3-21.15:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_java_vm", "product": { "name": "database_-_java_vm", "product_id": "CSAFPID-1673452", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_java_vm:23.4-23.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "autonomous_health_framework", "product": { "name": "autonomous_health_framework", "product_id": "CSAFPID-816798", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:autonomous_health_framework:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "autonomous_health_framework", "product": { "name": "autonomous_health_framework", "product_id": "CSAFPID-816799", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:autonomous_health_framework:23.10:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "autonomous_health_framework", "product": { "name": "autonomous_health_framework", "product_id": "CSAFPID-1673525", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:autonomous_health_framework:prior_to_24.9:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "graalvm_for_jdk", "product": { "name": "graalvm_for_jdk", "product_id": "CSAFPID-912046", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "graalvm_for_jdk", "product": { "name": "graalvm_for_jdk", "product_id": "CSAFPID-1503299", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:17.0.11:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "graalvm_for_jdk", "product": { "name": "graalvm_for_jdk", "product_id": "CSAFPID-816855", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:17.0.9:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "graalvm_for_jdk", "product": { "name": "graalvm_for_jdk", "product_id": "CSAFPID-816361", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:21.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "graalvm_for_jdk", "product": { "name": "graalvm_for_jdk", "product_id": "CSAFPID-912045", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "graalvm_for_jdk", "product": { "name": "graalvm_for_jdk", "product_id": "CSAFPID-1503302", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:21.0.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "graalvm_for_jdk", "product": { "name": "graalvm_for_jdk", "product_id": "CSAFPID-912044", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "graalvm_for_jdk", "product": { "name": "graalvm_for_jdk", "product_id": "CSAFPID-1503306", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:22.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "graalvm_for_jdk", "product": { "name": "graalvm_for_jdk", "product_id": "CSAFPID-816852", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:graalvm_enterprise_edition20.3.12:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "graalvm_for_jdk", "product": { "name": "graalvm_for_jdk", "product_id": "CSAFPID-912600", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:graalvm_enterprise_edition20.3.13:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "graalvm_for_jdk", "product": { "name": "graalvm_for_jdk", "product_id": "CSAFPID-816853", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:graalvm_enterprise_edition21.3.8:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "graalvm_for_jdk", "product": { "name": "graalvm_for_jdk", "product_id": "CSAFPID-912601", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:graalvm_enterprise_edition21.3.9:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "graalvm_for_jdk", "product": { "name": "graalvm_for_jdk", "product_id": "CSAFPID-816854", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:graalvm_enterprise_edition22.3.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sqlcl", "product": { "name": "sqlcl", "product_id": "CSAFPID-816801", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:sqlcl:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sqlcl", "product": { "name": "sqlcl", "product_id": "CSAFPID-1673405", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:sqlcl:23.4-23.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "application_express_administration", "product": { "name": "application_express_administration", "product_id": "CSAFPID-764731", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:application_express_administration:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "application_express_customers_plugin", "product": { "name": "application_express_customers_plugin", "product_id": "CSAFPID-764732", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:application_express_customers_plugin:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "application_express_team_calendar_plugin", "product": { "name": "application_express_team_calendar_plugin", "product_id": "CSAFPID-764733", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:application_express_team_calendar_plugin:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "application_express", "product": { "name": "application_express", "product_id": "CSAFPID-266119", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:application_express:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "application_express", "product": { "name": "application_express", "product_id": "CSAFPID-1673510", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:application_express:23.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "application_express", "product": { "name": "application_express", "product_id": "CSAFPID-1503575", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:application_express:23.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "application_express", "product": { "name": "application_express", "product_id": "CSAFPID-1673188", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:application_express:24.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "autonomous_health_framework", "product": { "name": "autonomous_health_framework", "product_id": "CSAFPID-765238", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:autonomous_health_framework:19c:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "autonomous_health_framework", "product": { "name": "autonomous_health_framework", "product_id": "CSAFPID-765239", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:autonomous_health_framework:21c:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "blockchain_platform", "product": { "name": "blockchain_platform", "product_id": "CSAFPID-764779", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:blockchain_platform:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "blockchain_platform", "product": { "name": "blockchain_platform", "product_id": "CSAFPID-89587", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:blockchain_platform:21.1.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "essbase", "product": { "name": "essbase", "product_id": "CSAFPID-765259", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:essbase:_security_and_provisioning___21.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "essbase", "product": { "name": "essbase", "product_id": "CSAFPID-187448", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:essbase:21.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "essbase", "product": { "name": "essbase", "product_id": "CSAFPID-94075", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:essbase:21.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "essbase", "product": { "name": "essbase", "product_id": "CSAFPID-220886", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:essbase:21.4.3.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "essbase", "product": { "name": "essbase", "product_id": "CSAFPID-611394", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:essbase:21.5.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "essbase", "product": { "name": "essbase", "product_id": "CSAFPID-816317", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:essbase:21.5.3.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "essbase", "product": { "name": "essbase", "product_id": "CSAFPID-912567", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:essbase:21.5.4.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "essbase", "product": { "name": "essbase", "product_id": "CSAFPID-1503612", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:essbase:21.5.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "essbase", "product": { "name": "essbase", "product_id": "CSAFPID-1673479", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:essbase:21.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "oracle_essbase", "product": { "name": "oracle_essbase", "product_id": "CSAFPID-1650506", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:oracle_essbase:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_big_data_and_application_adapters", "product": { "name": "goldengate_big_data_and_application_adapters", "product_id": "CSAFPID-816845", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_big_data_and_application_adapters", "product": { "name": "goldengate_big_data_and_application_adapters", "product_id": "CSAFPID-1650825", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:19.1.0.0.0-19.1.0.0.18:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_big_data_and_application_adapters", "product": { "name": "goldengate_big_data_and_application_adapters", "product_id": "CSAFPID-1673404", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:19.1.0.0.0-19.1.0.0.9:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_big_data_and_application_adapters", "product": { "name": "goldengate_big_data_and_application_adapters", "product_id": "CSAFPID-1650831", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:21.3-21.14.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_big_data", "product": { "name": "goldengate_big_data", "product_id": "CSAFPID-764274", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_big_data:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_stream_analytics", "product": { "name": "goldengate_stream_analytics", "product_id": "CSAFPID-764752", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_stream_analytics:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_stream_analytics", "product": { "name": "goldengate_stream_analytics", "product_id": "CSAFPID-1673384", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_stream_analytics:19.1.0.0.0-19.1.0.0.9:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_stream_analytics", "product": { "name": "goldengate_stream_analytics", "product_id": "CSAFPID-220192", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_stream_analytics:19.1.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_stream_analytics", "product": { "name": "goldengate_stream_analytics", "product_id": "CSAFPID-220193", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_stream_analytics:19.1.0.0.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_studio", "product": { "name": "goldengate_studio", "product_id": "CSAFPID-816846", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_studio:12.2.0.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_studio", "product": { "name": "goldengate_studio", "product_id": "CSAFPID-611390", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_studio:12.2.1.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_studio", "product": { "name": "goldengate_studio", "product_id": "CSAFPID-764803", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_studio:fusion_middleware_12.2.1.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_veridata", "product": { "name": "goldengate_veridata", "product_id": "CSAFPID-764275", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_veridata:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate", "product": { "name": "goldengate", "product_id": "CSAFPID-342816", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate", "product": { "name": "goldengate", "product_id": "CSAFPID-1650767", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate:19.1.0.0.0-19.23.0.0.240716:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate", "product": { "name": "goldengate", "product_id": "CSAFPID-485902", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate:19.1.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate", "product": { "name": "goldengate", "product_id": "CSAFPID-1503736", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate:19.23.0.0.240716:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate", "product": { "name": "goldengate", "product_id": "CSAFPID-219912", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate:19c:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate", "product": { "name": "goldengate", "product_id": "CSAFPID-1503739", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate:21.14:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate", "product": { "name": "goldengate", "product_id": "CSAFPID-1650765", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate:21.3-21.14:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate", "product": { "name": "goldengate", "product_id": "CSAFPID-1503738", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate:21.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "oracle_goldengate_stream_analytics", "product": { "name": "oracle_goldengate_stream_analytics", "product_id": "CSAFPID-1650515", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:oracle_goldengate_stream_analytics:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "management_pack_for__goldengate", "product": { "name": "management_pack_for__goldengate", "product_id": "CSAFPID-764861", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:management_pack_for__goldengate:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "management_pack_for__goldengate", "product": { "name": "management_pack_for__goldengate", "product_id": "CSAFPID-1503640", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:management_pack_for__goldengate:12.2.1.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "oracle_goldengate_studio", "product": { "name": "oracle_goldengate_studio", "product_id": "CSAFPID-1650835", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:oracle_goldengate_studio:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "oracle_goldengate", "product": { "name": "oracle_goldengate", "product_id": "CSAFPID-1650575", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:oracle_goldengate:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-764813", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-1503661", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:1.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-1503663", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:1.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-1673497", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:1.5.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-764764", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:19.5.33:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-764765", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:20.3.28:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-1673491", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:20.3.40:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-764766", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:21.2.55:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-1673495", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:21.2.71:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-764767", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:22.3.26:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-1673493", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:22.3.45:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-1673489", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:23.3.33:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-1673488", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:24.1.17:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-1650757", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:prior_to_19.5.42:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-1650758", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:prior_to_20.3.40:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-1650761", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:prior_to_21.2.27:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-1650760", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:prior_to_22.3.46:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-1650759", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:prior_to_23.3.32:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "oracle_nosql_database", "product": { "name": "oracle_nosql_database", "product_id": "CSAFPID-1650584", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:oracle_nosql_database:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "oracle_secure_backup", "product": { "name": "oracle_secure_backup", "product_id": "CSAFPID-1650563", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:oracle_secure_backup:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "secure_backup", "product": { "name": "secure_backup", "product_id": "CSAFPID-667692", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:secure_backup:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "secure_backup", "product": { "name": "secure_backup", "product_id": "CSAFPID-345049", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:secure_backup:18.1.0.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "secure_backup", "product": { "name": "secure_backup", "product_id": "CSAFPID-611417", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:secure_backup:18.1.0.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "secure_backup", "product": { "name": "secure_backup", "product_id": "CSAFPID-1673422", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:secure_backup:19.1.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "oracle_sql_developer", "product": { "name": "oracle_sql_developer", "product_id": "CSAFPID-1650638", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:oracle_sql_developer:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sql_developer", "product": { "name": "sql_developer", "product_id": "CSAFPID-764822", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:sql_developer:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sql_developer", "product": { "name": "sql_developer", "product_id": "CSAFPID-220643", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:sql_developer:21.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sql_developer", "product": { "name": "sql_developer", "product_id": "CSAFPID-816870", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:sql_developer:22.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sql_developer", "product": { "name": "sql_developer", "product_id": "CSAFPID-816871", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:sql_developer:23.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sql_developer", "product": { "name": "sql_developer", "product_id": "CSAFPID-1673397", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:sql_developer:24.3.0:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "oracle" }, { "branches": [ { "category": "product_name", "name": "oracle_application_express", "product": { "name": "oracle_application_express", "product_id": "CSAFPID-1673144", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle_corporation:oracle_application_express:24.1:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "oracle_corporation" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-1471", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "notes": [ { "category": "other", "text": "Deserialization of Untrusted Data", "title": "CWE-502" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-764731", "CSAFPID-764732", "CSAFPID-764733", "CSAFPID-764250", "CSAFPID-611394", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-611390", "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-764764", "CSAFPID-764765", "CSAFPID-764766", "CSAFPID-764767", "CSAFPID-764779", "CSAFPID-94075", "CSAFPID-220886", "CSAFPID-764803", "CSAFPID-764813", "CSAFPID-342816", "CSAFPID-764752", "CSAFPID-764822", "CSAFPID-1650515", "CSAFPID-1650638", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816317", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-89587", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816361", "CSAFPID-220643", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-667692", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-912046", "CSAFPID-912045", "CSAFPID-912044" ] }, "references": [ { "category": "self", "summary": "CVE-2022-1471", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-1471.json" } ], "title": "CVE-2022-1471" }, { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "notes": [ { "category": "other", "text": "Integer Coercion Error", "title": "CWE-192" }, { "category": "other", "text": "Incorrect Conversion between Numeric Types", "title": "CWE-681" } ], "product_status": { "known_affected": [ "CSAFPID-764779", "CSAFPID-94075", "CSAFPID-342816", "CSAFPID-764803", "CSAFPID-764813", "CSAFPID-764822", "CSAFPID-764752", "CSAFPID-764275", "CSAFPID-764861", "CSAFPID-266119", "CSAFPID-187448", "CSAFPID-219912", "CSAFPID-765238", "CSAFPID-765239", "CSAFPID-765259", "CSAFPID-667692", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-764250", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816317", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816361", "CSAFPID-220643", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-1673384", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-912046", "CSAFPID-912045", "CSAFPID-912044", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] }, "references": [ { "category": "self", "summary": "CVE-2022-34169", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-34169.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-764779", "CSAFPID-94075", "CSAFPID-342816", "CSAFPID-764803", "CSAFPID-764813", "CSAFPID-764822", "CSAFPID-764752", "CSAFPID-764275", "CSAFPID-764861", "CSAFPID-266119", "CSAFPID-187448", "CSAFPID-219912", "CSAFPID-765238", "CSAFPID-765239", "CSAFPID-765259", "CSAFPID-667692", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-764250", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816317", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816361", "CSAFPID-220643", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-1673384", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-912046", "CSAFPID-912045", "CSAFPID-912044", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] } ], "title": "CVE-2022-34169" }, { "cve": "CVE-2022-36033", "cwe": { "id": "CWE-87", "name": "Improper Neutralization of Alternate XSS Syntax" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Alternate XSS Syntax", "title": "CWE-87" }, { "category": "other", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" } ], "product_status": { "known_affected": [ "CSAFPID-764250", "CSAFPID-611394", "CSAFPID-764731", "CSAFPID-764732", "CSAFPID-764733", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-611390", "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-764764", "CSAFPID-764765", "CSAFPID-764766", "CSAFPID-764767", "CSAFPID-764779", "CSAFPID-220886", "CSAFPID-94075", "CSAFPID-764803", "CSAFPID-342816", "CSAFPID-764752", "CSAFPID-764861", "CSAFPID-764813", "CSAFPID-764822", "CSAFPID-266119", "CSAFPID-187448", "CSAFPID-1650515", "CSAFPID-1650835", "CSAFPID-219912", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816317", "CSAFPID-667692", "CSAFPID-1673384", "CSAFPID-912561", "CSAFPID-1503575", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816361", "CSAFPID-220643", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-912567", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-912046", "CSAFPID-912045", "CSAFPID-912044", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] }, "references": [ { "category": "self", "summary": "CVE-2022-36033", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-36033.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-764250", "CSAFPID-611394", "CSAFPID-764731", "CSAFPID-764732", "CSAFPID-764733", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-611390", "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-764764", "CSAFPID-764765", "CSAFPID-764766", "CSAFPID-764767", "CSAFPID-764779", "CSAFPID-220886", "CSAFPID-94075", "CSAFPID-764803", "CSAFPID-342816", "CSAFPID-764752", "CSAFPID-764861", "CSAFPID-764813", "CSAFPID-764822", "CSAFPID-266119", "CSAFPID-187448", "CSAFPID-1650515", "CSAFPID-1650835", "CSAFPID-219912", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816317", "CSAFPID-667692", "CSAFPID-1673384", "CSAFPID-912561", "CSAFPID-1503575", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816361", "CSAFPID-220643", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-912567", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-912046", "CSAFPID-912045", "CSAFPID-912044", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] } ], "title": "CVE-2022-36033" }, { "cve": "CVE-2022-37454", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" }, { "category": "other", "text": "Integer Overflow to Buffer Overflow", "title": "CWE-680" } ], "product_status": { "known_affected": [ "CSAFPID-764250", "CSAFPID-611394", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-611390", "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-764731", "CSAFPID-764732", "CSAFPID-764733", "CSAFPID-220886", "CSAFPID-342816", "CSAFPID-764752", "CSAFPID-764764", "CSAFPID-764765", "CSAFPID-764766", "CSAFPID-764767", "CSAFPID-764779", "CSAFPID-94075", "CSAFPID-764803", "CSAFPID-764813", "CSAFPID-764822", "CSAFPID-1650563", "CSAFPID-89587", "CSAFPID-764861" ] }, "references": [ { "category": "self", "summary": "CVE-2022-37454", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-37454.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-764250", "CSAFPID-611394", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-611390", "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-764731", "CSAFPID-764732", "CSAFPID-764733", "CSAFPID-220886", "CSAFPID-342816", "CSAFPID-764752", "CSAFPID-764764", "CSAFPID-764765", "CSAFPID-764766", "CSAFPID-764767", "CSAFPID-764779", "CSAFPID-94075", "CSAFPID-764803", "CSAFPID-764813", "CSAFPID-764822", "CSAFPID-1650563", "CSAFPID-89587", "CSAFPID-764861" ] } ], "title": "CVE-2022-37454" }, { "cve": "CVE-2022-38136", "product_status": { "known_affected": [ "CSAFPID-1673385", "CSAFPID-1673386" ] }, "references": [ { "category": "self", "summary": "CVE-2022-38136", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-38136.json" } ], "title": "CVE-2022-38136" }, { "cve": "CVE-2022-40196", "product_status": { "known_affected": [ "CSAFPID-1673385", "CSAFPID-1673386" ] }, "references": [ { "category": "self", "summary": "CVE-2022-40196", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-40196.json" } ], "title": "CVE-2022-40196" }, { "cve": "CVE-2022-41342", "product_status": { "known_affected": [ "CSAFPID-1673385", "CSAFPID-1673386" ] }, "references": [ { "category": "self", "summary": "CVE-2022-41342", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-41342.json" } ], "title": "CVE-2022-41342" }, { "cve": "CVE-2022-42919", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "other", "text": "Missing Encryption of Sensitive Data", "title": "CWE-311" }, { "category": "other", "text": "Improper Privilege Management", "title": "CWE-269" } ], "product_status": { "known_affected": [ "CSAFPID-764250", "CSAFPID-611394", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-611390", "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-764731", "CSAFPID-764732", "CSAFPID-764733", "CSAFPID-220886", "CSAFPID-342816", "CSAFPID-764752", "CSAFPID-764764", "CSAFPID-764765", "CSAFPID-764766", "CSAFPID-764767", "CSAFPID-764779", "CSAFPID-94075", "CSAFPID-764803", "CSAFPID-764813", "CSAFPID-764822", "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2022-42919", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-42919.json" } ], "title": "CVE-2022-42919" }, { "cve": "CVE-2022-45061", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "other", "text": "Inefficient Algorithmic Complexity", "title": "CWE-407" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-764731", "CSAFPID-764732", "CSAFPID-764733", "CSAFPID-220886", "CSAFPID-764250", "CSAFPID-611394", "CSAFPID-342816", "CSAFPID-764752", "CSAFPID-764764", "CSAFPID-764765", "CSAFPID-764766", "CSAFPID-764767", "CSAFPID-764779", "CSAFPID-94075", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-611390", "CSAFPID-764803", "CSAFPID-764813", "CSAFPID-764822", "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2022-45061", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-45061.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-764731", "CSAFPID-764732", "CSAFPID-764733", "CSAFPID-220886", "CSAFPID-764250", "CSAFPID-611394", "CSAFPID-342816", "CSAFPID-764752", "CSAFPID-764764", "CSAFPID-764765", "CSAFPID-764766", "CSAFPID-764767", "CSAFPID-764779", "CSAFPID-94075", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-611390", "CSAFPID-764803", "CSAFPID-764813", "CSAFPID-764822", "CSAFPID-89587" ] } ], "title": "CVE-2022-45061" }, { "cve": "CVE-2022-46337", "product_status": { "known_affected": [ "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-1673384", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-764752", "CSAFPID-764275", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-912046", "CSAFPID-912045", "CSAFPID-912044", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-764250", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816317", "CSAFPID-816845", "CSAFPID-342816", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-816361", "CSAFPID-764813", "CSAFPID-220643", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-667692" ] }, "references": [ { "category": "self", "summary": "CVE-2022-46337", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-46337.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-1673384", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-764752", "CSAFPID-764275", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-912046", "CSAFPID-912045", "CSAFPID-912044", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-764250", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816317", "CSAFPID-816845", "CSAFPID-342816", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-816361", "CSAFPID-764813", "CSAFPID-220643", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-667692" ] } ], "title": "CVE-2022-46337" }, { "cve": "CVE-2023-2976", "cwe": { "id": "CWE-552", "name": "Files or Directories Accessible to External Parties" }, "notes": [ { "category": "other", "text": "Files or Directories Accessible to External Parties", "title": "CWE-552" } ], "product_status": { "known_affected": [ "CSAFPID-1650584", "CSAFPID-1650835", "CSAFPID-1650506", "CSAFPID-1650515", "CSAFPID-816317", "CSAFPID-816845", "CSAFPID-342816", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816361", "CSAFPID-764813", "CSAFPID-220643", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-667692", "CSAFPID-89587", "CSAFPID-1673397", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-345049", "CSAFPID-816801", "CSAFPID-611390", "CSAFPID-611394", "CSAFPID-611417", "CSAFPID-764250", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] }, "references": [ { "category": "self", "summary": "CVE-2023-2976", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-2976.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1650584", "CSAFPID-1650835", "CSAFPID-1650506", "CSAFPID-1650515", "CSAFPID-816317", "CSAFPID-816845", "CSAFPID-342816", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816361", "CSAFPID-764813", "CSAFPID-220643", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-667692", "CSAFPID-89587", "CSAFPID-1673397", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-345049", "CSAFPID-816801", "CSAFPID-611390", "CSAFPID-611394", "CSAFPID-611417", "CSAFPID-764250", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] } ], "title": "CVE-2023-2976" }, { "cve": "CVE-2023-4043", "cwe": { "id": "CWE-834", "name": "Excessive Iteration" }, "notes": [ { "category": "other", "text": "Excessive Iteration", "title": "CWE-834" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-1673405", "CSAFPID-1673397", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-764250", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] }, "references": [ { "category": "self", "summary": "CVE-2023-4043", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4043.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673405", "CSAFPID-1673397", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-764250", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] } ], "title": "CVE-2023-4043" }, { "cve": "CVE-2023-4759", "cwe": { "id": "CWE-59", "name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)" }, "notes": [ { "category": "other", "text": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)", "title": "CWE-59" }, { "category": "other", "text": "Improper Handling of Case Sensitivity", "title": "CWE-178" } ], "product_status": { "known_affected": [ "CSAFPID-1673397", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2023-4759", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4759.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673397", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2023-4759" }, { "cve": "CVE-2023-4863", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" }, { "category": "other", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" }, { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-89587", "CSAFPID-816846", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-342816", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-816798", "CSAFPID-816801" ] }, "references": [ { "category": "self", "summary": "CVE-2023-4863", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4863.json" } ], "title": "CVE-2023-4863" }, { "cve": "CVE-2023-5072", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-1650575", "CSAFPID-1650515", "CSAFPID-1650835", "CSAFPID-89587", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-764250", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] }, "references": [ { "category": "self", "summary": "CVE-2023-5072", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5072.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1650575", "CSAFPID-1650515", "CSAFPID-1650835", "CSAFPID-89587", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-764250", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] } ], "title": "CVE-2023-5072" }, { "cve": "CVE-2023-26031", "cwe": { "id": "CWE-426", "name": "Untrusted Search Path" }, "notes": [ { "category": "other", "text": "Untrusted Search Path", "title": "CWE-426" } ], "product_status": { "known_affected": [ "CSAFPID-1673384", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2023-26031", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26031.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673384", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2023-26031" }, { "cve": "CVE-2023-26551", "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2023-26551", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26551.json" } ], "scores": [ { "cvss_v3": { "baseScore": 0.0, "baseSeverity": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2023-26551" }, { "cve": "CVE-2023-26552", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2023-26552", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26552.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2023-26552" }, { "cve": "CVE-2023-26553", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2023-26553", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26553.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2023-26553" }, { "cve": "CVE-2023-26554", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2023-26554", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26554.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2023-26554" }, { "cve": "CVE-2023-26555", "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2023-26555", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26555.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2023-26555" }, { "cve": "CVE-2023-28484", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "product_status": { "known_affected": [ "CSAFPID-764250", "CSAFPID-764731", "CSAFPID-764732", "CSAFPID-764733", "CSAFPID-220886", "CSAFPID-816317", "CSAFPID-764813", "CSAFPID-89587", "CSAFPID-342816", "CSAFPID-345049", "CSAFPID-764752", "CSAFPID-764764", "CSAFPID-764765", "CSAFPID-764766", "CSAFPID-764767", "CSAFPID-611390", "CSAFPID-611394", "CSAFPID-611417", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-220643", "CSAFPID-667692", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871" ] }, "references": [ { "category": "self", "summary": "CVE-2023-28484", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-28484.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-764250", "CSAFPID-764731", "CSAFPID-764732", "CSAFPID-764733", "CSAFPID-220886", "CSAFPID-816317", "CSAFPID-764813", "CSAFPID-89587", "CSAFPID-342816", "CSAFPID-345049", "CSAFPID-764752", "CSAFPID-764764", "CSAFPID-764765", "CSAFPID-764766", "CSAFPID-764767", "CSAFPID-611390", "CSAFPID-611394", "CSAFPID-611417", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-220643", "CSAFPID-667692", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871" ] } ], "title": "CVE-2023-28484" }, { "cve": "CVE-2023-29469", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "other", "text": "Double Free", "title": "CWE-415" } ], "product_status": { "known_affected": [ "CSAFPID-611417", "CSAFPID-764731", "CSAFPID-764732", "CSAFPID-764733", "CSAFPID-816317", "CSAFPID-89587", "CSAFPID-220886", "CSAFPID-342816", "CSAFPID-345049", "CSAFPID-764752", "CSAFPID-611390", "CSAFPID-611394", "CSAFPID-764764", "CSAFPID-764765", "CSAFPID-764766", "CSAFPID-764767", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-220643", "CSAFPID-667692", "CSAFPID-764813", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-764250", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871" ] }, "references": [ { "category": "self", "summary": "CVE-2023-29469", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-29469.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-611417", "CSAFPID-764731", "CSAFPID-764732", "CSAFPID-764733", "CSAFPID-816317", "CSAFPID-89587", "CSAFPID-220886", "CSAFPID-342816", "CSAFPID-345049", "CSAFPID-764752", "CSAFPID-611390", "CSAFPID-611394", "CSAFPID-764764", "CSAFPID-764765", "CSAFPID-764766", "CSAFPID-764767", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-220643", "CSAFPID-667692", "CSAFPID-764813", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-764250", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871" ] } ], "title": "CVE-2023-29469" }, { "cve": "CVE-2023-33201", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-764250", "CSAFPID-611394", "CSAFPID-1650584", "CSAFPID-1673397", "CSAFPID-912561", "CSAFPID-345049", "CSAFPID-611390", "CSAFPID-611417", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] }, "references": [ { "category": "self", "summary": "CVE-2023-33201", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-33201.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-764250", "CSAFPID-611394", "CSAFPID-1650584", "CSAFPID-1673397", "CSAFPID-912561", "CSAFPID-345049", "CSAFPID-611390", "CSAFPID-611417", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] } ], "title": "CVE-2023-33201" }, { "cve": "CVE-2023-37920", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "other", "text": "Improper Certificate Validation", "title": "CWE-295" }, { "category": "other", "text": "Insufficient Verification of Data Authenticity", "title": "CWE-345" } ], "product_status": { "known_affected": [ "CSAFPID-89587", "CSAFPID-1503575", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612" ] }, "references": [ { "category": "self", "summary": "CVE-2023-37920", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-37920.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587", "CSAFPID-1503575", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612" ] } ], "title": "CVE-2023-37920" }, { "cve": "CVE-2023-39410", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "notes": [ { "category": "other", "text": "Deserialization of Untrusted Data", "title": "CWE-502" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-1673404", "CSAFPID-1673384", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-764250", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871" ] }, "references": [ { "category": "self", "summary": "CVE-2023-39410", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-39410.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673404", "CSAFPID-1673384", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-764250", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871" ] } ], "title": "CVE-2023-39410" }, { "cve": "CVE-2023-44487", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1650757", "CSAFPID-1650758", "CSAFPID-1650759", "CSAFPID-1650760", "CSAFPID-1650761", "CSAFPID-89587", "CSAFPID-816361", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-667692", "CSAFPID-764250", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503603", "CSAFPID-1503575", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] }, "references": [ { "category": "self", "summary": "CVE-2023-44487", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-44487.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1650757", "CSAFPID-1650758", "CSAFPID-1650759", "CSAFPID-1650760", "CSAFPID-1650761", "CSAFPID-89587", "CSAFPID-816361", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-667692", "CSAFPID-764250", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503603", "CSAFPID-1503575", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] } ], "title": "CVE-2023-44487" }, { "cve": "CVE-2023-44981", "cwe": { "id": "CWE-639", "name": "Authorization Bypass Through User-Controlled Key" }, "notes": [ { "category": "other", "text": "Authorization Bypass Through User-Controlled Key", "title": "CWE-639" } ], "product_status": { "known_affected": [ "CSAFPID-1650515", "CSAFPID-89587", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-764250", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601" ] }, "references": [ { "category": "self", "summary": "CVE-2023-44981", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-44981.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1650515", "CSAFPID-89587", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-764250", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601" ] } ], "title": "CVE-2023-44981" }, { "cve": "CVE-2023-45288", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2023-45288", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-45288.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2023-45288" }, { "cve": "CVE-2023-48795", "cwe": { "id": "CWE-222", "name": "Truncation of Security-relevant Information" }, "notes": [ { "category": "other", "text": "Truncation of Security-relevant Information", "title": "CWE-222" } ], "product_status": { "known_affected": [ "CSAFPID-1650765", "CSAFPID-1650757", "CSAFPID-1650758", "CSAFPID-1650767", "CSAFPID-1650759", "CSAFPID-1650760", "CSAFPID-1650761", "CSAFPID-89587", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-764250", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-1503575", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] }, "references": [ { "category": "self", "summary": "CVE-2023-48795", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-48795.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1650765", "CSAFPID-1650757", "CSAFPID-1650758", "CSAFPID-1650767", "CSAFPID-1650759", "CSAFPID-1650760", "CSAFPID-1650761", "CSAFPID-89587", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-764250", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-1503575", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] } ], "title": "CVE-2023-48795" }, { "cve": "CVE-2023-49083", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "product_status": { "known_affected": [ "CSAFPID-89587", "CSAFPID-342816", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-816798", "CSAFPID-816801", "CSAFPID-816846", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-816845", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2023-49083", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-49083.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587", "CSAFPID-342816", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-816798", "CSAFPID-816801", "CSAFPID-816846", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-816845", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2023-49083" }, { "cve": "CVE-2023-51384", "cwe": { "id": "CWE-304", "name": "Missing Critical Step in Authentication" }, "notes": [ { "category": "other", "text": "Missing Critical Step in Authentication", "title": "CWE-304" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2023-51384", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-51384.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2023-51384" }, { "cve": "CVE-2023-51385", "cwe": { "id": "CWE-78", "name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "title": "CWE-78" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2023-51385", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-51385.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2023-51385" }, { "cve": "CVE-2023-52425", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-89587", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2023-52425", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52425.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2023-52425" }, { "cve": "CVE-2023-52426", "cwe": { "id": "CWE-776", "name": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)" }, "notes": [ { "category": "other", "text": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)", "title": "CWE-776" } ], "product_status": { "known_affected": [ "CSAFPID-89587", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2023-52426", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52426.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2023-52426" }, { "cve": "CVE-2024-1874", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "title": "CWE-77" }, { "category": "other", "text": "Improper Encoding or Escaping of Output", "title": "CWE-116" } ], "product_status": { "known_affected": [ "CSAFPID-1673422", "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-1874", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-1874.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673422", "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-1874" }, { "cve": "CVE-2024-2408", "cwe": { "id": "CWE-203", "name": "Observable Discrepancy" }, "notes": [ { "category": "other", "text": "Observable Discrepancy", "title": "CWE-203" }, { "category": "other", "text": "Observable Timing Discrepancy", "title": "CWE-208" }, { "category": "other", "text": "Use of a Broken or Risky Cryptographic Algorithm", "title": "CWE-327" }, { "category": "other", "text": "Covert Timing Channel", "title": "CWE-385" } ], "product_status": { "known_affected": [ "CSAFPID-1673422", "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-2408", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2408.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673422", "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-2408" }, { "cve": "CVE-2024-2511", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "other", "text": "Improperly Controlled Sequential Memory Allocation", "title": "CWE-1325" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-1673479", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-2511", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2511.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-1673479", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-2511" }, { "cve": "CVE-2024-4577", "cwe": { "id": "CWE-88", "name": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)", "title": "CWE-88" }, { "category": "other", "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "title": "CWE-78" } ], "product_status": { "known_affected": [ "CSAFPID-1673422", "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-4577", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4577.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673422", "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-4577" }, { "cve": "CVE-2024-4603", "cwe": { "id": "CWE-606", "name": "Unchecked Input for Loop Condition" }, "notes": [ { "category": "other", "text": "Unchecked Input for Loop Condition", "title": "CWE-606" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-1673479", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-4603", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4603.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-1673479", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-4603" }, { "cve": "CVE-2024-4741", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-1673479", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-4741", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4741.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-1673479", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-4741" }, { "cve": "CVE-2024-5458", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-1673422", "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-5458", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5458.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673422", "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-5458" }, { "cve": "CVE-2024-5535", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "other", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" } ], "product_status": { "known_affected": [ "CSAFPID-1673508", "CSAFPID-1673525" ] }, "references": [ { "category": "self", "summary": "CVE-2024-5535", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5535.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673508", "CSAFPID-1673525" ] } ], "title": "CVE-2024-5535" }, { "cve": "CVE-2024-5585", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "notes": [ { "category": "other", "text": "Improper Encoding or Escaping of Output", "title": "CWE-116" }, { "category": "other", "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "title": "CWE-78" }, { "category": "other", "text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)", "title": "CWE-88" } ], "product_status": { "known_affected": [ "CSAFPID-1673422", "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-5585", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5585.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673422", "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-5585" }, { "cve": "CVE-2024-6119", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "notes": [ { "category": "other", "text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "title": "CWE-843" } ], "product_status": { "known_affected": [ "CSAFPID-1673508", "CSAFPID-1673525" ] }, "references": [ { "category": "self", "summary": "CVE-2024-6119", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6119.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673508", "CSAFPID-1673525" ] } ], "title": "CVE-2024-6119" }, { "cve": "CVE-2024-6232", "cwe": { "id": "CWE-1333", "name": "Inefficient Regular Expression Complexity" }, "notes": [ { "category": "other", "text": "Inefficient Regular Expression Complexity", "title": "CWE-1333" } ], "references": [ { "category": "self", "summary": "CVE-2024-6232", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6232.json" } ], "title": "CVE-2024-6232" }, { "cve": "CVE-2024-7264", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-1673529", "CSAFPID-1673479", "CSAFPID-1673511", "CSAFPID-1673512" ] }, "references": [ { "category": "self", "summary": "CVE-2024-7264", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7264.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673529", "CSAFPID-1673479", "CSAFPID-1673511", "CSAFPID-1673512" ] } ], "title": "CVE-2024-7264" }, { "cve": "CVE-2024-7592", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "references": [ { "category": "self", "summary": "CVE-2024-7592", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7592.json" } ], "title": "CVE-2024-7592" }, { "cve": "CVE-2024-21131", "product_status": { "known_affected": [ "CSAFPID-1503299", "CSAFPID-1503306", "CSAFPID-1503302", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21131", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21131.json" } ], "title": "CVE-2024-21131" }, { "cve": "CVE-2024-21138", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "other", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" } ], "product_status": { "known_affected": [ "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21138", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21138.json" } ], "title": "CVE-2024-21138" }, { "cve": "CVE-2024-21140", "product_status": { "known_affected": [ "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503299", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21140", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21140.json" } ], "title": "CVE-2024-21140" }, { "cve": "CVE-2024-21144", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21144", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21144.json" } ], "title": "CVE-2024-21144" }, { "cve": "CVE-2024-21145", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-1503299", "CSAFPID-1503306", "CSAFPID-1503302", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21145", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21145.json" } ], "title": "CVE-2024-21145" }, { "cve": "CVE-2024-21147", "product_status": { "known_affected": [ "CSAFPID-1503306", "CSAFPID-1503302", "CSAFPID-1503299", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21147", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21147.json" } ], "title": "CVE-2024-21147" }, { "cve": "CVE-2024-21233", "product_status": { "known_affected": [ "CSAFPID-1673385", "CSAFPID-1673442", "CSAFPID-1673386" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21233", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21233.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-1673385", "CSAFPID-1673442", "CSAFPID-1673386" ] } ], "title": "CVE-2024-21233" }, { "cve": "CVE-2024-21242", "product_status": { "known_affected": [ "CSAFPID-1673443", "CSAFPID-1673444", "CSAFPID-1673445" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21242", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21242.json" } ], "scores": [ { "cvss_v3": { "baseScore": 3.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "CSAFPID-1673443", "CSAFPID-1673444", "CSAFPID-1673445" ] } ], "title": "CVE-2024-21242" }, { "cve": "CVE-2024-21251", "product_status": { "known_affected": [ "CSAFPID-1673450", "CSAFPID-1673451", "CSAFPID-1673452" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21251", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21251.json" } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-1673450", "CSAFPID-1673451", "CSAFPID-1673452" ] } ], "title": "CVE-2024-21251" }, { "cve": "CVE-2024-21261", "product_status": { "known_affected": [ "CSAFPID-1673144", "CSAFPID-1503575", "CSAFPID-1673188" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21261", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21261.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-1673144", "CSAFPID-1503575", "CSAFPID-1673188" ] } ], "title": "CVE-2024-21261" }, { "cve": "CVE-2024-22018", "cwe": { "id": "CWE-275", "name": "-" }, "notes": [ { "category": "other", "text": "CWE-275", "title": "CWE-275" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2024-22018", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22018.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2024-22018" }, { "cve": "CVE-2024-22020", "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2024-22020", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22020.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2024-22020" }, { "cve": "CVE-2024-22201", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1673384", "CSAFPID-342816", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-816798", "CSAFPID-816801", "CSAFPID-816846", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-816845", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-22201", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22201.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673384", "CSAFPID-342816", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-816798", "CSAFPID-816801", "CSAFPID-816846", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-816845", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-22201" }, { "cve": "CVE-2024-23807", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-1650831", "CSAFPID-1650825", "CSAFPID-1673479", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-23807", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23807.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1650831", "CSAFPID-1650825", "CSAFPID-1673479", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-23807" }, { "cve": "CVE-2024-23944", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-1673384", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-23944", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23944.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1673384", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-23944" }, { "cve": "CVE-2024-24989", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2024-24989", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24989.json" } ], "title": "CVE-2024-24989" }, { "cve": "CVE-2024-24990", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2024-24990", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24990.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2024-24990" }, { "cve": "CVE-2024-25710", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "other", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" } ], "product_status": { "known_affected": [ "CSAFPID-89587", "CSAFPID-1673384", "CSAFPID-816871", "CSAFPID-816798", "CSAFPID-816801", "CSAFPID-342816", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-816846", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-912046", "CSAFPID-1503640", "CSAFPID-816845", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-25710", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-25710.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587", "CSAFPID-1673384", "CSAFPID-816871", "CSAFPID-816798", "CSAFPID-816801", "CSAFPID-342816", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-816846", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-912046", "CSAFPID-1503640", "CSAFPID-816845", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-25710" }, { "cve": "CVE-2024-26130", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "product_status": { "known_affected": [ "CSAFPID-89587", "CSAFPID-342816", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-816798", "CSAFPID-816801", "CSAFPID-816846", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-816845", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-26130", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26130.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587", "CSAFPID-342816", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-816798", "CSAFPID-816801", "CSAFPID-816846", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-816845", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-26130" }, { "cve": "CVE-2024-26308", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-89587", "CSAFPID-1673384", "CSAFPID-816871", "CSAFPID-816798", "CSAFPID-342816", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-816801", "CSAFPID-816846", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-816845", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-26308", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26308.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587", "CSAFPID-1673384", "CSAFPID-816871", "CSAFPID-816798", "CSAFPID-342816", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-816801", "CSAFPID-816846", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-816845", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-26308" }, { "cve": "CVE-2024-27983", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-27983", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27983.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "products": [ "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-27983" }, { "cve": "CVE-2024-28182", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Detection of Error Condition Without Action", "title": "CWE-390" }, { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-1673442", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-28182", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28182.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673442", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-28182" }, { "cve": "CVE-2024-28849", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-89587", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-28849", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28849.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-89587", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-28849" }, { "cve": "CVE-2024-28887", "cwe": { "id": "CWE-427", "name": "Uncontrolled Search Path Element" }, "notes": [ { "category": "other", "text": "Uncontrolled Search Path Element", "title": "CWE-427" } ], "product_status": { "known_affected": [ "CSAFPID-1673385", "CSAFPID-1673442", "CSAFPID-1673386" ] }, "references": [ { "category": "self", "summary": "CVE-2024-28887", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28887.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673385", "CSAFPID-1673442", "CSAFPID-1673386" ] } ], "title": "CVE-2024-28887" }, { "cve": "CVE-2024-29025", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-1673488", "CSAFPID-1673489", "CSAFPID-1673491", "CSAFPID-1673492", "CSAFPID-1673493", "CSAFPID-1673495", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-29025", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29025.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-1673488", "CSAFPID-1673489", "CSAFPID-1673491", "CSAFPID-1673492", "CSAFPID-1673493", "CSAFPID-1673495", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-29025" }, { "cve": "CVE-2024-29131", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-1673497", "CSAFPID-1673397", "CSAFPID-1673384", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-29131", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29131.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-1673497", "CSAFPID-1673397", "CSAFPID-1673384", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-29131" }, { "cve": "CVE-2024-29133", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-1673497", "CSAFPID-1673397", "CSAFPID-1673384", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-29133", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29133.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-1673497", "CSAFPID-1673397", "CSAFPID-1673384", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-29133" }, { "cve": "CVE-2024-31079", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Stack-based Buffer Overflow", "title": "CWE-121" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2024-31079", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-31079.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2024-31079" }, { "cve": "CVE-2024-32760", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2024-32760", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-32760.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2024-32760" }, { "cve": "CVE-2024-34161", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "other", "text": "Missing Release of Memory after Effective Lifetime", "title": "CWE-401" }, { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2024-34161", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34161.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2024-34161" }, { "cve": "CVE-2024-34750", "cwe": { "id": "CWE-755", "name": "Improper Handling of Exceptional Conditions" }, "notes": [ { "category": "other", "text": "Improper Handling of Exceptional Conditions", "title": "CWE-755" }, { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1673504", "CSAFPID-1673506" ] }, "references": [ { "category": "self", "summary": "CVE-2024-34750", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34750.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673504", "CSAFPID-1673506" ] } ], "title": "CVE-2024-34750" }, { "cve": "CVE-2024-35200", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2024-35200", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35200.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2024-35200" }, { "cve": "CVE-2024-36137", "cwe": { "id": "CWE-275", "name": "-" }, "notes": [ { "category": "other", "text": "CWE-275", "title": "CWE-275" }, { "category": "other", "text": "Incorrect Permission Assignment for Critical Resource", "title": "CWE-732" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2024-36137", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36137.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2024-36137" }, { "cve": "CVE-2024-36138", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "title": "CWE-77" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2024-36138", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36138.json" } ], "title": "CVE-2024-36138" }, { "cve": "CVE-2024-36387", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-36387", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36387.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-36387" }, { "cve": "CVE-2024-37370", "cwe": { "id": "CWE-130", "name": "Improper Handling of Length Parameter Inconsistency" }, "notes": [ { "category": "other", "text": "Improper Handling of Length Parameter Inconsistency", "title": "CWE-130" } ], "product_status": { "known_affected": [ "CSAFPID-1673507", "CSAFPID-1673508", "CSAFPID-1673509" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37370", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37370.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673507", "CSAFPID-1673508", "CSAFPID-1673509" ] } ], "title": "CVE-2024-37370" }, { "cve": "CVE-2024-37371", "cwe": { "id": "CWE-130", "name": "Improper Handling of Length Parameter Inconsistency" }, "notes": [ { "category": "other", "text": "Improper Handling of Length Parameter Inconsistency", "title": "CWE-130" } ], "product_status": { "known_affected": [ "CSAFPID-1673507", "CSAFPID-1673508", "CSAFPID-1673509" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37371", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37371.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673507", "CSAFPID-1673508", "CSAFPID-1673509" ] } ], "title": "CVE-2024-37371" }, { "cve": "CVE-2024-37372", "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37372", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37372.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2024-37372" }, { "cve": "CVE-2024-38356", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" } ], "product_status": { "known_affected": [ "CSAFPID-1673510", "CSAFPID-1503575", "CSAFPID-1673188" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38356", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38356.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-1673510", "CSAFPID-1503575", "CSAFPID-1673188" ] } ], "title": "CVE-2024-38356" }, { "cve": "CVE-2024-38357", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" } ], "product_status": { "known_affected": [ "CSAFPID-1673510", "CSAFPID-1503575", "CSAFPID-1673188" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38357", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38357.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-1673510", "CSAFPID-1503575", "CSAFPID-1673188" ] } ], "title": "CVE-2024-38357" }, { "cve": "CVE-2024-38472", "cwe": { "id": "CWE-918", "name": "Server-Side Request Forgery (SSRF)" }, "notes": [ { "category": "other", "text": "Server-Side Request Forgery (SSRF)", "title": "CWE-918" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38472", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38472.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-38472" }, { "cve": "CVE-2024-38473", "cwe": { "id": "CWE-172", "name": "Encoding Error" }, "notes": [ { "category": "other", "text": "Encoding Error", "title": "CWE-172" }, { "category": "other", "text": "Improper Encoding or Escaping of Output", "title": "CWE-116" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38473", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38473.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-38473" }, { "cve": "CVE-2024-38474", "cwe": { "id": "CWE-172", "name": "Encoding Error" }, "notes": [ { "category": "other", "text": "Encoding Error", "title": "CWE-172" }, { "category": "other", "text": "Improper Encoding or Escaping of Output", "title": "CWE-116" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38474", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38474.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-38474" }, { "cve": "CVE-2024-38475", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "other", "text": "Improper Access Control", "title": "CWE-284" }, { "category": "other", "text": "Improper Encoding or Escaping of Output", "title": "CWE-116" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38475", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38475.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-38475" }, { "cve": "CVE-2024-38476", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "other", "text": "Inclusion of Functionality from Untrusted Control Sphere", "title": "CWE-829" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38476", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38476.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-38476" }, { "cve": "CVE-2024-38477", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38477", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38477.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-38477" }, { "cve": "CVE-2024-38998", "cwe": { "id": "CWE-1321", "name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)" }, "notes": [ { "category": "other", "text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)", "title": "CWE-1321" } ], "product_status": { "known_affected": [ "CSAFPID-1673511", "CSAFPID-1673512", "CSAFPID-1503575", "CSAFPID-1673188" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38998", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38998.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673511", "CSAFPID-1673512", "CSAFPID-1503575", "CSAFPID-1673188" ] } ], "title": "CVE-2024-38998" }, { "cve": "CVE-2024-38999", "cwe": { "id": "CWE-1321", "name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)" }, "notes": [ { "category": "other", "text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)", "title": "CWE-1321" } ], "product_status": { "known_affected": [ "CSAFPID-1673511", "CSAFPID-1673512", "CSAFPID-1503575", "CSAFPID-1673188" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38999", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38999.json" } ], "scores": [ { "cvss_v3": { "baseScore": 10.0, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673511", "CSAFPID-1673512", "CSAFPID-1503575", "CSAFPID-1673188" ] } ], "title": "CVE-2024-38999" }, { "cve": "CVE-2024-39573", "cwe": { "id": "CWE-918", "name": "Server-Side Request Forgery (SSRF)" }, "notes": [ { "category": "other", "text": "Server-Side Request Forgery (SSRF)", "title": "CWE-918" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-39573", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39573.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-39573" }, { "cve": "CVE-2024-39884", "cwe": { "id": "CWE-18", "name": "-" }, "notes": [ { "category": "other", "text": "CWE-18", "title": "CWE-18" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-39884", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39884.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-39884" }, { "cve": "CVE-2024-40725", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "other", "text": "Exposure of Resource to Wrong Sphere", "title": "CWE-668" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-1673479" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40725", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40725.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-1673479" ] } ], "title": "CVE-2024-40725" }, { "cve": "CVE-2024-40898", "cwe": { "id": "CWE-918", "name": "Server-Side Request Forgery (SSRF)" }, "notes": [ { "category": "other", "text": "Server-Side Request Forgery (SSRF)", "title": "CWE-918" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-1673479" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40898", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40898.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-1673479" ] } ], "title": "CVE-2024-40898" }, { "cve": "CVE-2024-45490", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" }, { "category": "other", "text": "Incorrect Calculation of Buffer Size", "title": "CWE-131" } ], "product_status": { "known_affected": [ "CSAFPID-1673385", "CSAFPID-1673442", "CSAFPID-1673386" ] }, "references": [ { "category": "self", "summary": "CVE-2024-45490", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45490.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673385", "CSAFPID-1673442", "CSAFPID-1673386" ] } ], "title": "CVE-2024-45490" }, { "cve": "CVE-2024-45491", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" } ], "product_status": { "known_affected": [ "CSAFPID-1673385", "CSAFPID-1673442", "CSAFPID-1673386" ] }, "references": [ { "category": "self", "summary": "CVE-2024-45491", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45491.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673385", "CSAFPID-1673442", "CSAFPID-1673386" ] } ], "title": "CVE-2024-45491" }, { "cve": "CVE-2024-45492", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" } ], "product_status": { "known_affected": [ "CSAFPID-1673385", "CSAFPID-1673442", "CSAFPID-1673386" ] }, "references": [ { "category": "self", "summary": "CVE-2024-45492", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45492.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673385", "CSAFPID-1673442", "CSAFPID-1673386" ] } ], "title": "CVE-2024-45492" }, { "cve": "CVE-2024-45801", "cwe": { "id": "CWE-1333", "name": "Inefficient Regular Expression Complexity" }, "notes": [ { "category": "other", "text": "Inefficient Regular Expression Complexity", "title": "CWE-1333" }, { "category": "other", "text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)", "title": "CWE-1321" } ], "product_status": { "known_affected": [ "CSAFPID-1503575", "CSAFPID-1673188" ] }, "references": [ { "category": "self", "summary": "CVE-2024-45801", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45801.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-1503575", "CSAFPID-1673188" ] } ], "title": "CVE-2024-45801" } ] }
NCSC-2024-0306
Vulnerability from csaf_ncscnl
Published
2024-07-17 13:55
Modified
2024-07-17 13:55
Summary
Kwetsbaarheden verholpen in Oracle Supply Chain
Notes
The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:
NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.
NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.
This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.
Feiten
Er zijn kwetsbaarheden verholpen in Oracle Supply Chain.
Interpretaties
Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorieën schade:
* Denial-of-Service (DoS)
* Toegang tot gevoelige gegevens
* Toegang tot systeemgegevens
* Manipulatie van gegevens
* (Remote) code execution (Gebruikersrechten)
Oplossingen
Oracle heeft updates beschikbaar gesteld om de kwetsbaarheden te verhelpen. Zie de referenties voor meer informatie.
Kans
medium
Schade
high
CWE-192
Integer Coercion Error
CWE-20
Improper Input Validation
CWE-400
Uncontrolled Resource Consumption
CWE-404
Improper Resource Shutdown or Release
CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
CWE-681
Incorrect Conversion between Numeric Types
CWE-770
Allocation of Resources Without Limits or Throttling
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "Er zijn kwetsbaarheden verholpen in Oracle Supply Chain.", "title": "Feiten" }, { "category": "description", "text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n* Denial-of-Service (DoS)\n* Toegang tot gevoelige gegevens\n* Toegang tot systeemgegevens\n* Manipulatie van gegevens\n* (Remote) code execution (Gebruikersrechten)", "title": "Interpretaties" }, { "category": "description", "text": "Oracle heeft updates beschikbaar gesteld om de kwetsbaarheden te verhelpen. Zie de referenties voor meer informatie.", "title": "Oplossingen" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Integer Coercion Error", "title": "CWE-192" }, { "category": "general", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "general", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "general", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "general", "text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)", "title": "CWE-444" }, { "category": "general", "text": "Incorrect Conversion between Numeric Types", "title": "CWE-681" }, { "category": "general", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "references": [ { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-24998" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-37536" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-46589" }, { "category": "external", "summary": "Reference - oracle", "url": "https://www.oracle.com/docs/tech/security-alerts/cpujul2024csaf.json" }, { "category": "external", "summary": "Reference - cveprojectv5; ibm; nvd; oracle", "url": "https://www.oracle.com/security-alerts/cpujul2024.html" } ], "title": " Kwetsbaarheden verholpen in Oracle Supply Chain", "tracking": { "current_release_date": "2024-07-17T13:55:37.062720Z", "id": "NCSC-2024-0306", "initial_release_date": "2024-07-17T13:55:37.062720Z", "revision_history": [ { "date": "2024-07-17T13:55:37.062720Z", "number": "0", "summary": "Initiele versie" } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "agile_engineering_data_management", "product": { "name": "agile_engineering_data_management", "product_id": "CSAFPID-764768", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:agile_engineering_data_management:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "autovue_for_agile_product_lifecycle_management", "product": { "name": "autovue_for_agile_product_lifecycle_management", "product_id": "CSAFPID-2302", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:autovue_for_agile_product_lifecycle_management:21.0.2:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "oracle" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "notes": [ { "category": "other", "text": "Integer Coercion Error", "title": "CWE-192" }, { "category": "other", "text": "Incorrect Conversion between Numeric Types", "title": "CWE-681" } ], "product_status": { "known_affected": [ "CSAFPID-2302", "CSAFPID-764768" ] }, "references": [ { "category": "self", "summary": "CVE-2022-34169", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-34169.json" } ], "title": "CVE-2022-34169" }, { "cve": "CVE-2023-24998", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-2302", "CSAFPID-764768" ] }, "references": [ { "category": "self", "summary": "CVE-2023-24998", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-24998.json" } ], "title": "CVE-2023-24998" }, { "cve": "CVE-2023-37536", "product_status": { "known_affected": [ "CSAFPID-764768", "CSAFPID-2302" ] }, "references": [ { "category": "self", "summary": "CVE-2023-37536", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-37536.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-764768", "CSAFPID-2302" ] } ], "title": "CVE-2023-37536" }, { "cve": "CVE-2023-44487", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-764768", "CSAFPID-2302" ] }, "references": [ { "category": "self", "summary": "CVE-2023-44487", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-44487.json" } ], "title": "CVE-2023-44487" }, { "cve": "CVE-2023-46589", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "notes": [ { "category": "other", "text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)", "title": "CWE-444" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-764768", "CSAFPID-2302" ] }, "references": [ { "category": "self", "summary": "CVE-2023-46589", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46589.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-764768", "CSAFPID-2302" ] } ], "title": "CVE-2023-46589" } ] }
ncsc-2024-0294
Vulnerability from csaf_ncscnl
Published
2024-07-17 13:52
Modified
2024-07-17 13:52
Summary
Kwetsbaarheden verholpen in Oracle Communications
Notes
The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:
NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.
NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.
This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.
Feiten
Er zijn kwetsbaarheden verholpen in Oracle Communications.
Interpretaties
Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorieën schade:
* Denial-of-Service (DoS)
* Toegang tot gevoelige gegevens
* Toegang tot systeemgegevens
* Manipulatie van gegevens
* (Remote) code execution (Gebruikersrechten)
Oplossingen
Oracle heeft updates beschikbaar gesteld om de kwetsbaarheden te verhelpen. Zie de referenties voor meer informatie.
Kans
medium
Schade
high
CWE-681
Incorrect Conversion between Numeric Types
CWE-770
Allocation of Resources Without Limits or Throttling
CWE-787
Out-of-bounds Write
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CWE-835
Loop with Unreachable Exit Condition ('Infinite Loop')
CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
CWE-918
Server-Side Request Forgery (SSRF)
CWE-192
Integer Coercion Error
CWE-20
Improper Input Validation
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CWE-222
Truncation of Security-relevant Information
CWE-284
Improper Access Control
CWE-295
Improper Certificate Validation
CWE-345
Insufficient Verification of Data Authenticity
CWE-352
Cross-Site Request Forgery (CSRF)
CWE-390
Detection of Error Condition Without Action
CWE-400
Uncontrolled Resource Consumption
CWE-404
Improper Resource Shutdown or Release
CWE-405
Asymmetric Resource Consumption (Amplification)
CWE-416
Use After Free
CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
CWE-450
Multiple Interpretations of UI Input
CWE-459
Incomplete Cleanup
CWE-476
NULL Pointer Dereference
CWE-502
Deserialization of Untrusted Data
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "Er zijn kwetsbaarheden verholpen in Oracle Communications.", "title": "Feiten" }, { "category": "description", "text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n* Denial-of-Service (DoS)\n* Toegang tot gevoelige gegevens\n* Toegang tot systeemgegevens\n* Manipulatie van gegevens\n* (Remote) code execution (Gebruikersrechten)", "title": "Interpretaties" }, { "category": "description", "text": "Oracle heeft updates beschikbaar gesteld om de kwetsbaarheden te verhelpen. Zie de referenties voor meer informatie.", "title": "Oplossingen" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Incorrect Conversion between Numeric Types", "title": "CWE-681" }, { "category": "general", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" }, { "category": "general", "text": "Out-of-bounds Write", "title": "CWE-787" }, { "category": "general", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" }, { "category": "general", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" }, { "category": "general", "text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)", "title": "CWE-88" }, { "category": "general", "text": "Server-Side Request Forgery (SSRF)", "title": "CWE-918" }, { "category": "general", "text": "Integer Coercion Error", "title": "CWE-192" }, { "category": "general", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "general", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "general", "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "title": "CWE-22" }, { "category": "general", "text": "Truncation of Security-relevant Information", "title": "CWE-222" }, { "category": "general", "text": "Improper Access Control", "title": "CWE-284" }, { "category": "general", "text": "Improper Certificate Validation", "title": "CWE-295" }, { "category": "general", "text": "Insufficient Verification of Data Authenticity", "title": "CWE-345" }, { "category": "general", "text": "Cross-Site Request Forgery (CSRF)", "title": "CWE-352" }, { "category": "general", "text": "Detection of Error Condition Without Action", "title": "CWE-390" }, { "category": "general", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "general", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "general", "text": "Asymmetric Resource Consumption (Amplification)", "title": "CWE-405" }, { "category": "general", "text": "Use After Free", "title": "CWE-416" }, { "category": "general", "text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)", "title": "CWE-444" }, { "category": "general", "text": "Multiple Interpretations of UI Input", "title": "CWE-450" }, { "category": "general", "text": "Incomplete Cleanup", "title": "CWE-459" }, { "category": "general", "text": "NULL Pointer Dereference", "title": "CWE-476" }, { "category": "general", "text": "Deserialization of Untrusted Data", "title": "CWE-502" }, { "category": "general", "text": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)", "title": "CWE-601" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "references": [ { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10086" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29425" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-41184" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42890" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48174" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-24998" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-33201" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-37920" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-46589" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-48795" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-51775" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52425" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5685" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0450" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-22019" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-22201" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-22234" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-22257" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-22262" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23672" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23807" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23897" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-24549" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-25062" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-25710" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26130" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26308" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27316" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-28182" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-28752" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-28849" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-29025" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-2961" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-34064" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-34069" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6162" }, { "category": "external", "summary": "Reference - oracle", "url": "https://www.oracle.com/docs/tech/security-alerts/cpujul2024csaf.json" }, { "category": "external", "summary": "Reference - cveprojectv5; ibm; nvd; oracle", "url": "https://www.oracle.com/security-alerts/cpujul2024.html" } ], "title": "Kwetsbaarheden verholpen in Oracle Communications", "tracking": { "current_release_date": "2024-07-17T13:52:53.293003Z", "id": "NCSC-2024-0294", "initial_release_date": "2024-07-17T13:52:53.293003Z", "revision_history": [ { "date": "2024-07-17T13:52:53.293003Z", "number": "0", "summary": "Initiele versie" } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "communications_asap", "product": { "name": "communications_asap", "product_id": "CSAFPID-204629", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_asap:7.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_asap", "product": { "name": "communications_asap", "product_id": "CSAFPID-816792", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_asap:7.4:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "oracle" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-10086", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "notes": [ { "category": "other", "text": "Deserialization of Untrusted Data", "title": "CWE-502" } ], "product_status": { "known_affected": [ "CSAFPID-204629", "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2019-10086", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2019/CVE-2019-10086.json" } ], "title": "CVE-2019-10086" }, { "cve": "CVE-2021-29425", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "other", "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "title": "CWE-22" } ], "product_status": { "known_affected": [ "CSAFPID-204629", "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2021-29425", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-29425.json" } ], "title": "CVE-2021-29425" }, { "cve": "CVE-2021-37533", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2021-37533", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-37533.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2021-37533" }, { "cve": "CVE-2021-41184", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" } ], "product_status": { "known_affected": [ "CSAFPID-204629", "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2021-41184", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-41184.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-204629", "CSAFPID-816792" ] } ], "title": "CVE-2021-41184" }, { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "notes": [ { "category": "other", "text": "Integer Coercion Error", "title": "CWE-192" }, { "category": "other", "text": "Incorrect Conversion between Numeric Types", "title": "CWE-681" } ], "product_status": { "known_affected": [ "CSAFPID-204629", "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2022-34169", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-34169.json" } ], "title": "CVE-2022-34169" }, { "cve": "CVE-2022-36033", "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2022-36033", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-36033.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2022-36033" }, { "cve": "CVE-2022-42890", "cwe": { "id": "CWE-918", "name": "Server-Side Request Forgery (SSRF)" }, "notes": [ { "category": "other", "text": "Server-Side Request Forgery (SSRF)", "title": "CWE-918" }, { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2022-42890", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-42890.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2022-42890" }, { "cve": "CVE-2022-48174", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2022-48174", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-48174.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2022-48174" }, { "cve": "CVE-2023-5685", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2023-5685", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5685.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2023-5685" }, { "cve": "CVE-2023-24998", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2023-24998", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-24998.json" } ], "title": "CVE-2023-24998" }, { "cve": "CVE-2023-33201", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2023-33201", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-33201.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2023-33201" }, { "cve": "CVE-2023-37920", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "other", "text": "Improper Certificate Validation", "title": "CWE-295" }, { "category": "other", "text": "Insufficient Verification of Data Authenticity", "title": "CWE-345" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2023-37920", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-37920.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2023-37920" }, { "cve": "CVE-2023-44487", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2023-44487", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-44487.json" } ], "title": "CVE-2023-44487" }, { "cve": "CVE-2023-46589", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "notes": [ { "category": "other", "text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)", "title": "CWE-444" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2023-46589", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46589.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2023-46589" }, { "cve": "CVE-2023-48795", "cwe": { "id": "CWE-222", "name": "Truncation of Security-relevant Information" }, "notes": [ { "category": "other", "text": "Truncation of Security-relevant Information", "title": "CWE-222" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2023-48795", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-48795.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2023-48795" }, { "cve": "CVE-2023-51775", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2023-51775", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-51775.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2023-51775" }, { "cve": "CVE-2023-52425", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2023-52425", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52425.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2023-52425" }, { "cve": "CVE-2024-0450", "cwe": { "id": "CWE-450", "name": "Multiple Interpretations of UI Input" }, "notes": [ { "category": "other", "text": "Multiple Interpretations of UI Input", "title": "CWE-450" }, { "category": "other", "text": "Asymmetric Resource Consumption (Amplification)", "title": "CWE-405" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-0450", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0450.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-0450" }, { "cve": "CVE-2024-2961", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-2961", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2961.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-2961" }, { "cve": "CVE-2024-6162", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-6162", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6162.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-6162" }, { "cve": "CVE-2024-22019", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-22019", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22019.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-22019" }, { "cve": "CVE-2024-22201", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-22201", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22201.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-22201" }, { "cve": "CVE-2024-22234", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "other", "text": "Improper Access Control", "title": "CWE-284" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-22234", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22234.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-22234" }, { "cve": "CVE-2024-22257", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "other", "text": "Improper Access Control", "title": "CWE-284" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-22257", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22257.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-22257" }, { "cve": "CVE-2024-22262", "cwe": { "id": "CWE-601", "name": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)" }, "notes": [ { "category": "other", "text": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)", "title": "CWE-601" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-22262", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22262.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-22262" }, { "cve": "CVE-2024-23672", "cwe": { "id": "CWE-459", "name": "Incomplete Cleanup" }, "notes": [ { "category": "other", "text": "Incomplete Cleanup", "title": "CWE-459" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-23672", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23672.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-23672" }, { "cve": "CVE-2024-23807", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-23807", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23807.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-23807" }, { "cve": "CVE-2024-23897", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "other", "text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)", "title": "CWE-88" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-23897", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23897.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-23897" }, { "cve": "CVE-2024-24549", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-24549", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24549.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-24549" }, { "cve": "CVE-2024-25062", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-25062", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-25062.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-25062" }, { "cve": "CVE-2024-25710", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "other", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-25710", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-25710.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-25710" }, { "cve": "CVE-2024-26130", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-26130", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26130.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-26130" }, { "cve": "CVE-2024-26308", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-26308", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26308.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-26308" }, { "cve": "CVE-2024-27316", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-27316", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27316.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-27316" }, { "cve": "CVE-2024-28182", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Detection of Error Condition Without Action", "title": "CWE-390" }, { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-28182", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28182.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-28182" }, { "cve": "CVE-2024-28752", "cwe": { "id": "CWE-918", "name": "Server-Side Request Forgery (SSRF)" }, "notes": [ { "category": "other", "text": "Server-Side Request Forgery (SSRF)", "title": "CWE-918" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-28752", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28752.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-28752" }, { "cve": "CVE-2024-28849", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-28849", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28849.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-28849" }, { "cve": "CVE-2024-29025", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-29025", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29025.json" } ], "title": "CVE-2024-29025" }, { "cve": "CVE-2024-34064", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-34064", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34064.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-34064" }, { "cve": "CVE-2024-34069", "cwe": { "id": "CWE-352", "name": "Cross-Site Request Forgery (CSRF)" }, "notes": [ { "category": "other", "text": "Cross-Site Request Forgery (CSRF)", "title": "CWE-352" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-34069", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34069.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-34069" } ] }
NCSC-2024-0294
Vulnerability from csaf_ncscnl
Published
2024-07-17 13:52
Modified
2024-07-17 13:52
Summary
Kwetsbaarheden verholpen in Oracle Communications
Notes
The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:
NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.
NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.
This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.
Feiten
Er zijn kwetsbaarheden verholpen in Oracle Communications.
Interpretaties
Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorieën schade:
* Denial-of-Service (DoS)
* Toegang tot gevoelige gegevens
* Toegang tot systeemgegevens
* Manipulatie van gegevens
* (Remote) code execution (Gebruikersrechten)
Oplossingen
Oracle heeft updates beschikbaar gesteld om de kwetsbaarheden te verhelpen. Zie de referenties voor meer informatie.
Kans
medium
Schade
high
CWE-681
Incorrect Conversion between Numeric Types
CWE-770
Allocation of Resources Without Limits or Throttling
CWE-787
Out-of-bounds Write
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CWE-835
Loop with Unreachable Exit Condition ('Infinite Loop')
CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
CWE-918
Server-Side Request Forgery (SSRF)
CWE-192
Integer Coercion Error
CWE-20
Improper Input Validation
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CWE-222
Truncation of Security-relevant Information
CWE-284
Improper Access Control
CWE-295
Improper Certificate Validation
CWE-345
Insufficient Verification of Data Authenticity
CWE-352
Cross-Site Request Forgery (CSRF)
CWE-390
Detection of Error Condition Without Action
CWE-400
Uncontrolled Resource Consumption
CWE-404
Improper Resource Shutdown or Release
CWE-405
Asymmetric Resource Consumption (Amplification)
CWE-416
Use After Free
CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
CWE-450
Multiple Interpretations of UI Input
CWE-459
Incomplete Cleanup
CWE-476
NULL Pointer Dereference
CWE-502
Deserialization of Untrusted Data
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "Er zijn kwetsbaarheden verholpen in Oracle Communications.", "title": "Feiten" }, { "category": "description", "text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n* Denial-of-Service (DoS)\n* Toegang tot gevoelige gegevens\n* Toegang tot systeemgegevens\n* Manipulatie van gegevens\n* (Remote) code execution (Gebruikersrechten)", "title": "Interpretaties" }, { "category": "description", "text": "Oracle heeft updates beschikbaar gesteld om de kwetsbaarheden te verhelpen. Zie de referenties voor meer informatie.", "title": "Oplossingen" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Incorrect Conversion between Numeric Types", "title": "CWE-681" }, { "category": "general", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" }, { "category": "general", "text": "Out-of-bounds Write", "title": "CWE-787" }, { "category": "general", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" }, { "category": "general", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" }, { "category": "general", "text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)", "title": "CWE-88" }, { "category": "general", "text": "Server-Side Request Forgery (SSRF)", "title": "CWE-918" }, { "category": "general", "text": "Integer Coercion Error", "title": "CWE-192" }, { "category": "general", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "general", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "general", "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "title": "CWE-22" }, { "category": "general", "text": "Truncation of Security-relevant Information", "title": "CWE-222" }, { "category": "general", "text": "Improper Access Control", "title": "CWE-284" }, { "category": "general", "text": "Improper Certificate Validation", "title": "CWE-295" }, { "category": "general", "text": "Insufficient Verification of Data Authenticity", "title": "CWE-345" }, { "category": "general", "text": "Cross-Site Request Forgery (CSRF)", "title": "CWE-352" }, { "category": "general", "text": "Detection of Error Condition Without Action", "title": "CWE-390" }, { "category": "general", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "general", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "general", "text": "Asymmetric Resource Consumption (Amplification)", "title": "CWE-405" }, { "category": "general", "text": "Use After Free", "title": "CWE-416" }, { "category": "general", "text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)", "title": "CWE-444" }, { "category": "general", "text": "Multiple Interpretations of UI Input", "title": "CWE-450" }, { "category": "general", "text": "Incomplete Cleanup", "title": "CWE-459" }, { "category": "general", "text": "NULL Pointer Dereference", "title": "CWE-476" }, { "category": "general", "text": "Deserialization of Untrusted Data", "title": "CWE-502" }, { "category": "general", "text": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)", "title": "CWE-601" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "references": [ { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10086" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29425" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-41184" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42890" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48174" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-24998" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-33201" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-37920" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-46589" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-48795" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-51775" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52425" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5685" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0450" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-22019" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-22201" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-22234" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-22257" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-22262" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23672" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23807" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23897" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-24549" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-25062" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-25710" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26130" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26308" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27316" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-28182" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-28752" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-28849" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-29025" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-2961" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-34064" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-34069" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6162" }, { "category": "external", "summary": "Reference - oracle", "url": "https://www.oracle.com/docs/tech/security-alerts/cpujul2024csaf.json" }, { "category": "external", "summary": "Reference - cveprojectv5; ibm; nvd; oracle", "url": "https://www.oracle.com/security-alerts/cpujul2024.html" } ], "title": "Kwetsbaarheden verholpen in Oracle Communications", "tracking": { "current_release_date": "2024-07-17T13:52:53.293003Z", "id": "NCSC-2024-0294", "initial_release_date": "2024-07-17T13:52:53.293003Z", "revision_history": [ { "date": "2024-07-17T13:52:53.293003Z", "number": "0", "summary": "Initiele versie" } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "communications_asap", "product": { "name": "communications_asap", "product_id": "CSAFPID-204629", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_asap:7.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_asap", "product": { "name": "communications_asap", "product_id": "CSAFPID-816792", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_asap:7.4:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "oracle" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-10086", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "notes": [ { "category": "other", "text": "Deserialization of Untrusted Data", "title": "CWE-502" } ], "product_status": { "known_affected": [ "CSAFPID-204629", "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2019-10086", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2019/CVE-2019-10086.json" } ], "title": "CVE-2019-10086" }, { "cve": "CVE-2021-29425", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "other", "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "title": "CWE-22" } ], "product_status": { "known_affected": [ "CSAFPID-204629", "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2021-29425", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-29425.json" } ], "title": "CVE-2021-29425" }, { "cve": "CVE-2021-37533", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2021-37533", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-37533.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2021-37533" }, { "cve": "CVE-2021-41184", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" } ], "product_status": { "known_affected": [ "CSAFPID-204629", "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2021-41184", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-41184.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-204629", "CSAFPID-816792" ] } ], "title": "CVE-2021-41184" }, { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "notes": [ { "category": "other", "text": "Integer Coercion Error", "title": "CWE-192" }, { "category": "other", "text": "Incorrect Conversion between Numeric Types", "title": "CWE-681" } ], "product_status": { "known_affected": [ "CSAFPID-204629", "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2022-34169", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-34169.json" } ], "title": "CVE-2022-34169" }, { "cve": "CVE-2022-36033", "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2022-36033", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-36033.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2022-36033" }, { "cve": "CVE-2022-42890", "cwe": { "id": "CWE-918", "name": "Server-Side Request Forgery (SSRF)" }, "notes": [ { "category": "other", "text": "Server-Side Request Forgery (SSRF)", "title": "CWE-918" }, { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2022-42890", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-42890.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2022-42890" }, { "cve": "CVE-2022-48174", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2022-48174", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-48174.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2022-48174" }, { "cve": "CVE-2023-5685", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2023-5685", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5685.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2023-5685" }, { "cve": "CVE-2023-24998", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2023-24998", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-24998.json" } ], "title": "CVE-2023-24998" }, { "cve": "CVE-2023-33201", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2023-33201", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-33201.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2023-33201" }, { "cve": "CVE-2023-37920", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "other", "text": "Improper Certificate Validation", "title": "CWE-295" }, { "category": "other", "text": "Insufficient Verification of Data Authenticity", "title": "CWE-345" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2023-37920", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-37920.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2023-37920" }, { "cve": "CVE-2023-44487", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2023-44487", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-44487.json" } ], "title": "CVE-2023-44487" }, { "cve": "CVE-2023-46589", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "notes": [ { "category": "other", "text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)", "title": "CWE-444" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2023-46589", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46589.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2023-46589" }, { "cve": "CVE-2023-48795", "cwe": { "id": "CWE-222", "name": "Truncation of Security-relevant Information" }, "notes": [ { "category": "other", "text": "Truncation of Security-relevant Information", "title": "CWE-222" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2023-48795", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-48795.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2023-48795" }, { "cve": "CVE-2023-51775", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2023-51775", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-51775.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2023-51775" }, { "cve": "CVE-2023-52425", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2023-52425", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52425.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2023-52425" }, { "cve": "CVE-2024-0450", "cwe": { "id": "CWE-450", "name": "Multiple Interpretations of UI Input" }, "notes": [ { "category": "other", "text": "Multiple Interpretations of UI Input", "title": "CWE-450" }, { "category": "other", "text": "Asymmetric Resource Consumption (Amplification)", "title": "CWE-405" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-0450", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0450.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-0450" }, { "cve": "CVE-2024-2961", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-2961", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2961.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-2961" }, { "cve": "CVE-2024-6162", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-6162", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6162.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-6162" }, { "cve": "CVE-2024-22019", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-22019", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22019.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-22019" }, { "cve": "CVE-2024-22201", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-22201", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22201.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-22201" }, { "cve": "CVE-2024-22234", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "other", "text": "Improper Access Control", "title": "CWE-284" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-22234", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22234.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-22234" }, { "cve": "CVE-2024-22257", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "other", "text": "Improper Access Control", "title": "CWE-284" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-22257", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22257.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-22257" }, { "cve": "CVE-2024-22262", "cwe": { "id": "CWE-601", "name": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)" }, "notes": [ { "category": "other", "text": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)", "title": "CWE-601" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-22262", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22262.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-22262" }, { "cve": "CVE-2024-23672", "cwe": { "id": "CWE-459", "name": "Incomplete Cleanup" }, "notes": [ { "category": "other", "text": "Incomplete Cleanup", "title": "CWE-459" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-23672", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23672.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-23672" }, { "cve": "CVE-2024-23807", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-23807", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23807.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-23807" }, { "cve": "CVE-2024-23897", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "other", "text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)", "title": "CWE-88" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-23897", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23897.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-23897" }, { "cve": "CVE-2024-24549", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-24549", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24549.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-24549" }, { "cve": "CVE-2024-25062", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-25062", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-25062.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-25062" }, { "cve": "CVE-2024-25710", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "other", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-25710", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-25710.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-25710" }, { "cve": "CVE-2024-26130", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-26130", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26130.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-26130" }, { "cve": "CVE-2024-26308", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-26308", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26308.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-26308" }, { "cve": "CVE-2024-27316", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-27316", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27316.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-27316" }, { "cve": "CVE-2024-28182", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Detection of Error Condition Without Action", "title": "CWE-390" }, { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-28182", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28182.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-28182" }, { "cve": "CVE-2024-28752", "cwe": { "id": "CWE-918", "name": "Server-Side Request Forgery (SSRF)" }, "notes": [ { "category": "other", "text": "Server-Side Request Forgery (SSRF)", "title": "CWE-918" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-28752", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28752.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-28752" }, { "cve": "CVE-2024-28849", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-28849", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28849.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-28849" }, { "cve": "CVE-2024-29025", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-29025", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29025.json" } ], "title": "CVE-2024-29025" }, { "cve": "CVE-2024-34064", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-34064", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34064.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-34064" }, { "cve": "CVE-2024-34069", "cwe": { "id": "CWE-352", "name": "Cross-Site Request Forgery (CSRF)" }, "notes": [ { "category": "other", "text": "Cross-Site Request Forgery (CSRF)", "title": "CWE-352" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-34069", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34069.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-34069" } ] }
gsd-2022-34169
Vulnerability from gsd
Modified
2023-12-13 01:19
Details
The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2022-34169", "description": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. The Apache Xalan Java project is dormant and in the process of being retired. No future releases of Apache Xalan Java to address this issue are expected. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "id": "GSD-2022-34169", "references": [ "https://www.debian.org/security/2022/dsa-5188", "https://www.debian.org/security/2022/dsa-5192", "https://access.redhat.com/errata/RHSA-2022:5681", "https://access.redhat.com/errata/RHSA-2022:5683", "https://access.redhat.com/errata/RHSA-2022:5684", "https://access.redhat.com/errata/RHSA-2022:5685", "https://access.redhat.com/errata/RHSA-2022:5687", "https://access.redhat.com/errata/RHSA-2022:5695", "https://access.redhat.com/errata/RHSA-2022:5696", "https://access.redhat.com/errata/RHSA-2022:5697", "https://access.redhat.com/errata/RHSA-2022:5698", "https://access.redhat.com/errata/RHSA-2022:5700", "https://access.redhat.com/errata/RHSA-2022:5701", "https://access.redhat.com/errata/RHSA-2022:5709", "https://access.redhat.com/errata/RHSA-2022:5726", "https://access.redhat.com/errata/RHSA-2022:5736", "https://access.redhat.com/errata/RHSA-2022:5753", "https://access.redhat.com/errata/RHSA-2022:5754", "https://www.suse.com/security/cve/CVE-2022-34169.html", "https://access.redhat.com/errata/RHSA-2022:5755", "https://access.redhat.com/errata/RHSA-2022:5756", "https://access.redhat.com/errata/RHSA-2022:5757", "https://access.redhat.com/errata/RHSA-2022:5758", "https://ubuntu.com/security/CVE-2022-34169", "https://alas.aws.amazon.com/cve/html/CVE-2022-34169.html", "https://www.debian.org/security/2022/dsa-5256", "https://advisories.mageia.org/CVE-2022-34169.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2022-34169" ], "details": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "id": "GSD-2022-34169", "modified": "2023-12-13T01:19:18.908040Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "ID": "CVE-2022-34169", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache Xalan-J", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "Xalan-J", "version_value": "2.7.2" } ] } } ] }, "vendor_name": "Apache Software Foundation" } ] } }, "credits": [ { "lang": "en", "value": "Reported by Felix Wilhelm, Google Project Zero" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "integer truncation" } ] } ] }, "references": { "reference_data": [ { "name": "https://lists.apache.org/thread/2qvl7r43wb4t8p9dd9om1bnkssk07sn8", "refsource": "MISC", "url": "https://lists.apache.org/thread/2qvl7r43wb4t8p9dd9om1bnkssk07sn8" }, { "name": "https://lists.apache.org/thread/12pxy4phsry6c34x2ol4fft6xlho4kyw", "refsource": "MISC", "url": "https://lists.apache.org/thread/12pxy4phsry6c34x2ol4fft6xlho4kyw" }, { "name": "http://www.openwall.com/lists/oss-security/2022/07/19/5", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2022/07/19/5" }, { "name": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "name": "http://www.openwall.com/lists/oss-security/2022/07/19/6", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2022/07/19/6" }, { "name": "http://www.openwall.com/lists/oss-security/2022/07/20/2", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2022/07/20/2" }, { "name": "http://www.openwall.com/lists/oss-security/2022/07/20/3", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2022/07/20/3" }, { "name": "https://www.debian.org/security/2022/dsa-5188", "refsource": "MISC", "url": "https://www.debian.org/security/2022/dsa-5188" }, { "name": "https://www.debian.org/security/2022/dsa-5192", "refsource": "MISC", "url": "https://www.debian.org/security/2022/dsa-5192" }, { "name": "https://security.netapp.com/advisory/ntap-20220729-0009/", "refsource": "MISC", "url": "https://security.netapp.com/advisory/ntap-20220729-0009/" }, { "name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO/", "refsource": "MISC", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO/" }, { "name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2/", "refsource": "MISC", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2/" }, { "name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB/", "refsource": "MISC", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB/" }, { "name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM/", "refsource": "MISC", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM/" }, { "name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ/", "refsource": "MISC", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ/" }, { "name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L/", "refsource": "MISC", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L/" }, { "name": "http://packetstormsecurity.com/files/168186/Xalan-J-XSLTC-Integer-Truncation.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/168186/Xalan-J-XSLTC-Integer-Truncation.html" }, { "name": "http://www.openwall.com/lists/oss-security/2022/10/18/2", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2022/10/18/2" }, { "name": "https://lists.debian.org/debian-lts-announce/2022/10/msg00024.html", "refsource": "MISC", "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00024.html" }, { "name": "https://www.debian.org/security/2022/dsa-5256", "refsource": "MISC", "url": "https://www.debian.org/security/2022/dsa-5256" }, { "name": "http://www.openwall.com/lists/oss-security/2022/11/04/8", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2022/11/04/8" }, { "name": "http://www.openwall.com/lists/oss-security/2022/11/07/2", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2022/11/07/2" }, { "name": "https://security.gentoo.org/glsa/202401-25", "refsource": "MISC", "url": "https://security.gentoo.org/glsa/202401-25" } ] }, "source": { "discovery": "UNKNOWN" } }, "gitlab.com": { "advisories": [ { "affected_range": "(,2.7.2]", "affected_versions": "All versions up to 2.7.2", "cwe_ids": [ "CWE-1035", "CWE-78", "CWE-937" ], "date": "2022-07-22", "description": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. The Apache Xalan Java project is dormant and in the process of being retired. No future releases of Apache Xalan Java to address this issue are expected. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.", "fixed_versions": [], "identifier": "CVE-2022-34169", "identifiers": [ "GHSA-9339-86wc-4qgf", "CVE-2022-34169" ], "not_impacted": "", "package_slug": "maven/xalan/xalan", "pubdate": "2022-07-20", "solution": "Unfortunately, there is no solution available yet.", "title": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2022-34169", "https://lists.apache.org/thread/12pxy4phsry6c34x2ol4fft6xlho4kyw", "https://lists.apache.org/thread/2qvl7r43wb4t8p9dd9om1bnkssk07sn8", "http://www.openwall.com/lists/oss-security/2022/07/19/5", "http://www.openwall.com/lists/oss-security/2022/07/19/6", "http://www.openwall.com/lists/oss-security/2022/07/20/2", "http://www.openwall.com/lists/oss-security/2022/07/20/3", "https://www.oracle.com/security-alerts/cpujul2022.html", "https://github.com/advisories/GHSA-9339-86wc-4qgf" ], "uuid": "24b8dd89-44e3-498a-8697-b83a13911bd6" } ] }, "nvd.nist.gov": { "cve": { "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:xalan-java:*:*:*:*:*:*:*:*", "matchCriteriaId": "E406791B-F9FD-4E3F-831C-296D8F8FF9BE", "versionEndIncluding": "2.7.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:graalvm:20.3.6:*:*:*:enterprise:*:*:*", "matchCriteriaId": "7D961E24-EA18-4217-B5F5-F847726D84E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:graalvm:21.3.2:*:*:*:enterprise:*:*:*", "matchCriteriaId": "601D92C4-F71F-47E2-9041-5C286D2137F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:graalvm:22.1.0:*:*:*:enterprise:*:*:*", "matchCriteriaId": "B18FE85D-C53D-44E9-8992-715820D1264B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:jdk:1.7.0:update343:*:*:*:*:*:*", "matchCriteriaId": "6E3C0BA3-FCD3-4CB8-B8C7-F931090A7DBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:jdk:1.8.0:update333:*:*:*:*:*:*", "matchCriteriaId": "EB2A5440-7FA7-4A86-AA19-E2ABBD809B19", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:jdk:11.0.15.1:*:*:*:*:*:*:*", "matchCriteriaId": "9C0485FC-E4B2-464E-8228-1387AC5F353B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:jdk:17.0.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "7AF3539B-0434-4310-AE88-F46864C7C20F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:jdk:18.0.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "F5CC9398-71B6-4480-95ED-EDCE838D157E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:jre:1.7.0:update343:*:*:*:*:*:*", "matchCriteriaId": "60614E43-090E-44D7-94AD-FFAE38FF111F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:jre:1.8.0:update333:*:*:*:*:*:*", "matchCriteriaId": "131E1C9E-721C-4176-B78B-69C01F90A9A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:jre:11.0.15.1:*:*:*:*:*:*:*", "matchCriteriaId": "AD4BFA12-588A-4D8D-B45F-648A55EC674C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:jre:17.0.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "0DF70EEA-EC9D-4FFC-B7BE-76F50C34D999", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:jre:18.0.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "4EF9CFB1-CEC9-483E-BECF-618190C03944", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "DD2ADA66-DCD0-4D28-80B2-77A0265CE7B9", "versionEndIncluding": "11.0.15", "versionStartIncluding": "11", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CA6BC07-2BDA-4913-AF2B-FD2146B0E539", "versionEndIncluding": "13.0.11", "versionStartIncluding": "13", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "5A2E366B-549D-48C5-B3FB-AD0E8C75AE08", "versionEndIncluding": "15.0.7", "versionStartIncluding": "15", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "15FD6A0B-BB1A-4875-926C-AB1B6EC1A053", "versionEndIncluding": "17.0.3", "versionStartIncluding": "17", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*", "matchCriteriaId": "E78B7C5A-FA51-41E4-AAB0-C6DED2EFCF4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*", "matchCriteriaId": "02011EDC-20A7-4A16-A592-7C76E0037997", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*", "matchCriteriaId": "AC6D4652-1226-4C60-BEDF-01EBF8AC0849", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*", "matchCriteriaId": "3C1F9ED7-7D93-41F4-9130-15BA734420AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*", "matchCriteriaId": "1CF9CDF1-95D3-4125-A73F-396D2280FC4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*", "matchCriteriaId": "A13266DC-F8D9-4F30-987F-65BBEAF8D3A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*", "matchCriteriaId": "C28388AB-CFC9-4749-A90F-383F5B905EA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*", "matchCriteriaId": "DA1B00F9-A81C-48B7-8DAA-F394DDF323F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*", "matchCriteriaId": "CA7AD457-6CE6-4925-8D94-A907B40233D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*", "matchCriteriaId": "A6F3FDD1-7CAC-4B84-ABB7-64E9D3FBD708", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*", "matchCriteriaId": "5480E5AD-DB46-474A-9B57-84ED088A75FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*", "matchCriteriaId": "881A4AE9-6012-4E91-98BE-0A352CC20703", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*", "matchCriteriaId": "7E1E1079-57D9-473B-A017-964F4745F329", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*", "matchCriteriaId": "B8D6446E-2915-4F12-87BE-E7420BC2626E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*", "matchCriteriaId": "564EDCE3-16E6-401D-8A43-032D1F8875E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*", "matchCriteriaId": "08278802-D31B-488A-BA6A-EBC816DF883A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*", "matchCriteriaId": "72BDA05A-C8BD-472E-8465-EE1F3E5D8CF6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*", "matchCriteriaId": "7BBB0969-565E-43E2-B067-A10AAA5F1958", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*", "matchCriteriaId": "D78BE95D-6270-469A-8035-FCDDB398F952", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*", "matchCriteriaId": "88C24F40-3150-4584-93D9-8307DE04EEE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*", "matchCriteriaId": "E0FC5A03-FF11-4787-BBF1-3ACF93A21F2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*", "matchCriteriaId": "19626B36-62FC-4497-A2E1-7D6CD9839B19", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*", "matchCriteriaId": "5713AEBD-35F6-44E8-A0CC-A42830D7AE20", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*", "matchCriteriaId": "8BE0C04B-440E-4B35-ACC8-6264514F764C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*", "matchCriteriaId": "555EC2A6-0475-48ED-AE0C-B306714A9333", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*", "matchCriteriaId": "EC1CF2AD-3F7A-4EF3-BD41-117A21553A9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update261:*:*:*:*:*:*", "matchCriteriaId": "02C55E2E-AEDE-455C-B128-168C918B5D97", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update271:*:*:*:*:*:*", "matchCriteriaId": "81831D37-6597-441B-87DE-38F7191BEA42", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update281:*:*:*:*:*:*", "matchCriteriaId": "EEA1594D-0AB5-436D-9E60-C26EE2175753", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update291:*:*:*:*:*:*", "matchCriteriaId": "B868FA41-C71B-491C-880B-484740B30C72", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*", "matchCriteriaId": "C242D3BE-9114-4A9E-BB78-45754C7CC450", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update301:*:*:*:*:*:*", "matchCriteriaId": "95954182-9541-4181-9647-B17FA5A79F9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update311:*:*:*:*:*:*", "matchCriteriaId": "9F6F0137-F91F-4028-BED2-C29640D52C23", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update321:*:*:*:*:*:*", "matchCriteriaId": "EAFB6B15-4AE6-47FC-8847-9DFADB7AE253", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*", "matchCriteriaId": "D61068FE-18EE-4ADB-BC69-A3ECE8724575", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*", "matchCriteriaId": "EFB59E80-4EC4-4399-BF40-6733E4E475A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*", "matchCriteriaId": "84E31265-22E1-4E91-BFCB-D2AFF445926A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*", "matchCriteriaId": "AB3A58C3-94BB-4120-BE1D-AAF8BBF7F22B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*", "matchCriteriaId": "50319E52-8739-47C5-B61E-3CA9B6A9A48F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*", "matchCriteriaId": "7ED515B9-DC74-4DC5-B98A-08D87D85E11E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*", "matchCriteriaId": "6D1D4868-1F9F-43F7-968C-6469B67D3F1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*", "matchCriteriaId": "568F1AC4-B0D7-4438-82E5-0E61500F2240", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*", "matchCriteriaId": "F5E99B4A-EDAD-4471-81C4-7E9C775C9D9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*", "matchCriteriaId": "14E9133E-9FF3-40DB-9A11-7469EF5FD265", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*", "matchCriteriaId": "94834710-3FA9-49D9-8600-B514CBCA4270", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*", "matchCriteriaId": "4228D9E1-7D82-4B49-9669-9CDAD7187432", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*", "matchCriteriaId": "F6231F48-2936-4F7D-96D5-4BA11F78EBE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*", "matchCriteriaId": "D96D5061-4A81-497E-9AD6-A8381B3B454C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*", "matchCriteriaId": "5345C21E-A01B-43B9-9A20-F2783D921C60", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*", "matchCriteriaId": "B219F360-83BD-4111-AB59-C9D4F55AF4C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*", "matchCriteriaId": "D25377EA-8E8F-4C76-8EA9-3BBDFB352815", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*", "matchCriteriaId": "59FEFE05-269A-4EAF-A80F-E4C2107B1197", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*", "matchCriteriaId": "E7E2AA7C-F602-4DB7-9EC1-0708C46C253C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*", "matchCriteriaId": "FB70E154-A304-429E-80F5-8D87B00E32D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*", "matchCriteriaId": "70892D06-6E75-4425-BBF0-4B684EC62A1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:milestone1:*:*:*:*:*:*", "matchCriteriaId": "7A165D71-71CC-4E6A-AA4F-FF8DB5B9A5AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:milestone2:*:*:*:*:*:*", "matchCriteriaId": "7417B2BB-9AC2-4AF4-A828-C89A0735AD92", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:milestone3:*:*:*:*:*:*", "matchCriteriaId": "6A0A57B5-6F88-4288-9CDE-F6613FE068D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:milestone4:*:*:*:*:*:*", "matchCriteriaId": "67ED8559-C348-4932-B7CE-CB96976A30EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:milestone5:*:*:*:*:*:*", "matchCriteriaId": "40AC3D91-263F-4345-9FAA-0E573EA64590", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:milestone6:*:*:*:*:*:*", "matchCriteriaId": "DD92AFA9-81F8-48D4-B79A-E7F066F69A99", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:milestone7:*:*:*:*:*:*", "matchCriteriaId": "2C4B2F24-A730-4818-90C8-A2D90C081F03", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:milestone8:*:*:*:*:*:*", "matchCriteriaId": "464087F2-C285-4574-957E-CE0663F07DE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:milestone9:*:*:*:*:*:*", "matchCriteriaId": "3E9BB880-A4F6-4887-8BB9-47AA298753D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*", "matchCriteriaId": "18DCFF53-B298-4534-AB5C-8A5EF59C616F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*", "matchCriteriaId": "083419F8-FDDF-4E36-88F8-857DB317C1D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*", "matchCriteriaId": "D7A74F65-57E8-4C9A-BA96-5EF401504F13", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*", "matchCriteriaId": "0D0B90FC-57B6-4315-9B29-3C36E58B2CF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*", "matchCriteriaId": "07812576-3C35-404C-A7D7-9BE9E3D76E00", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*", "matchCriteriaId": "00C52B1C-5447-4282-9667-9EBE0720B423", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*", "matchCriteriaId": "92BB9EB0-0C12-4E77-89EE-FB77097841B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*", "matchCriteriaId": "FF9D5DCE-2E8F-42B9-9038-AEA7E8C8CFFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*", "matchCriteriaId": "ABC0E7BB-F8B7-4369-9910-71240E4073A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*", "matchCriteriaId": "551B2640-8CEC-4C24-AF8B-7A7CEF864D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*", "matchCriteriaId": "0AE30779-48FB-451E-8CE1-F469F93B8772", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*", "matchCriteriaId": "60590FDE-7156-4314-A012-AA38BD2ADDC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*", "matchCriteriaId": "BE51AD3A-8331-4E8F-9DB1-7A0051731DFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*", "matchCriteriaId": "F24F6122-2256-41B6-9033-794C6424ED99", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*", "matchCriteriaId": "0EAFA79E-8C7A-48CF-8868-11378FE4B26F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*", "matchCriteriaId": "D1D6F19F-59B5-4BB6-AD35-013384025970", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*", "matchCriteriaId": "E7BA97BC-3ADA-465A-835B-6C3C5F416B56", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*", "matchCriteriaId": "B71F77A4-B7EB-47A1-AAFD-431A7D040B86", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*", "matchCriteriaId": "91D6BEA9-5943-44A4-946D-CEAA9BA99376", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*", "matchCriteriaId": "C079A3E0-44EB-4B9C-B4FC-B7621D165C3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*", "matchCriteriaId": "2CB74086-14B8-4237-8357-E0C6B5BB8313", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*", "matchCriteriaId": "3ABED20A-7C34-4E86-9AFB-F4DC9ECBB3A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*", "matchCriteriaId": "00C2B9C9-1177-4DA6-96CE-55F37F383F99", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update222:*:*:*:*:*:*", "matchCriteriaId": "435CF189-0BD8-40DF-A0DC-99862CDEAF8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*", "matchCriteriaId": "12A3F367-33AD-47C3-BFDC-871A17E72C94", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update232:*:*:*:*:*:*", "matchCriteriaId": "A18F994F-72CA-4AF5-A7D1-9F5AEA286D85", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*", "matchCriteriaId": "78261932-7373-4F16-91E0-1A72ADBEBC3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update242:*:*:*:*:*:*", "matchCriteriaId": "9BD90D3D-9B3A-4101-9A8A-5090F0A9719F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*", "matchCriteriaId": "B38C0276-0EBD-4E0B-BFCF-4DDECACE04E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update252:*:*:*:*:*:*", "matchCriteriaId": "F5A40B8A-D428-4008-9F21-AF21394C51D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update262:*:*:*:*:*:*", "matchCriteriaId": "FEC5B777-01E1-45EE-AF95-C3BD1F098B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update271:*:*:*:*:*:*", "matchCriteriaId": "3B504718-5DCE-43B4-B19A-C6B6E7444BD3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update281:*:*:*:*:*:*", "matchCriteriaId": "3102AA10-99A8-49A9-867E-7EEC56865680", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update282:*:*:*:*:*:*", "matchCriteriaId": "5A55CBC7-A7B2-4B89-8AB5-ED30DBE6814E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update291:*:*:*:*:*:*", "matchCriteriaId": "15BA8A26-2CDA-442B-A549-6BE92DCCD205", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update301:*:*:*:*:*:*", "matchCriteriaId": "56F2883B-6A1B-4081-8877-07AF3A73F6CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update302:*:*:*:*:*:*", "matchCriteriaId": "98C0742E-ACDD-4DB4-8A4C-B96702C8976C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*", "matchCriteriaId": "F8483034-DD5A-445D-892F-CDE90A7D58EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update312:*:*:*:*:*:*", "matchCriteriaId": "1716A5CD-1C32-4F19-9DDE-F9C7CCB6B420", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update322:*:*:*:*:*:*", "matchCriteriaId": "DAB4F663-BCAF-43DB-BCC3-24C060B0CBAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update332:*:*:*:*:*:*", "matchCriteriaId": "A8EF5BB8-7DAF-49B0-A11E-14E89EF7377A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*", "matchCriteriaId": "8279718F-878F-4868-8859-1728D13CD0D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*", "matchCriteriaId": "2C024E1A-FD2C-42E8-B227-C2AFD3040436", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*", "matchCriteriaId": "4F24389D-DDD0-4204-AA24-31C920A4F47E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*", "matchCriteriaId": "966979BE-1F21-4729-B6B8-610F74648344", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*", "matchCriteriaId": "F8534265-33BF-460D-BF74-5F55FDE50F29", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*", "matchCriteriaId": "F77AFC25-1466-4E56-9D5F-6988F3288E16", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*", "matchCriteriaId": "A650BEB8-E56F-4E42-9361-8D2DB083F0F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*", "matchCriteriaId": "799FFECD-E80A-44B3-953D-CDB5E195F3AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*", "matchCriteriaId": "A7047507-7CAF-4A14-AA9A-5CEF806EDE98", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*", "matchCriteriaId": "CFC7B179-95D3-4F94-84F6-73F1034A1AF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*", "matchCriteriaId": "9FB28526-9385-44CA-AF08-1899E6C3AE4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*", "matchCriteriaId": "E26B69E4-0B43-415F-A82B-52FDCB262B3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*", "matchCriteriaId": "27BC4150-70EC-462B-8FC5-20B3442CBB31", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*", "matchCriteriaId": "02646989-ECD9-40AE-A83E-EFF4080C69B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:openjdk:18:*:*:*:*:*:*:*", "matchCriteriaId": "56CBFC1F-C120-44F2-877A-C1C880AA89C4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*", "matchCriteriaId": "7EF6650C-558D-45C8-AE7D-136EE70CB6D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", "matchCriteriaId": "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*", "matchCriteriaId": "B55E8D50-99B4-47EC-86F9-699B67D473CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:cloud_insights_acquisition_unit:-:*:*:*:*:*:*:*", "matchCriteriaId": "CCAA4004-9319-478C-9D55-0E8307F872F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:*", "matchCriteriaId": "F0F202E8-97E6-4BBB-A0B6-4CA3F5803C08", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3C19813-E823-456A-B1CE-EC0684CE1953", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1BE6C1F-2565-4E97-92AA-16563E5660A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6E9EF0C-AFA8-4F7B-9FDC-1E0F7C26E737", "vulnerable": true }, { "criteria": "cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD7447BC-F315-4298-A822-549942FC118B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:azul:zulu:6.47:*:*:*:*:*:*:*", "matchCriteriaId": "4E4633C4-E552-439D-8FE4-139E3A7956CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:azul:zulu:7.54:*:*:*:*:*:*:*", "matchCriteriaId": "50C77346-8893-44F0-B0D1-5D4D30A9CA3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:azul:zulu:8.62:*:*:*:*:*:*:*", "matchCriteriaId": "63E58DE0-A96A-452E-986F-3BD2FEA7C723", "vulnerable": true }, { "criteria": "cpe:2.3:a:azul:zulu:11.56:*:*:*:*:*:*:*", "matchCriteriaId": "D3FB1BF4-3FCF-4007-A9E3-97C35483D6A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:azul:zulu:13.48:*:*:*:*:*:*:*", "matchCriteriaId": "BD7A33EC-DE03-424F-9796-E5EA071FF6CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:azul:zulu:15.40:*:*:*:*:*:*:*", "matchCriteriaId": "CCDAFFA9-0AA4-4C70-9154-8DA4BB255FD2", "vulnerable": true }, { "criteria": "cpe:2.3:a:azul:zulu:17.34:*:*:*:*:*:*:*", "matchCriteriaId": "B6302149-28AA-481E-BC6C-87D05E73768A", "vulnerable": true }, { "criteria": "cpe:2.3:a:azul:zulu:18.30:*:*:*:*:*:*:*", "matchCriteriaId": "20DFD9D8-8648-40F7-81B8-04F852A337FA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan." }, { "lang": "es", "value": "La biblioteca Apache Xalan Java XSLT es vulnerable a un problema de truncamiento de enteros cuando procesa hojas de estilo XSLT maliciosas. Esto puede usarse para corromper los archivos de clase Java generados por el compilador interno XSLTC y ejecutar c\u00f3digo de bytes Java arbitrario. El proyecto Apache Xalan Java est\u00e1 inactivo y en proceso de ser retirado. No son esperadas futuras versiones de Apache Xalan Java que abordan este problema. Nota: Los tiempos de ejecuci\u00f3n de Java (como OpenJDK) incluyen copias reempaquetadas de Xalan." } ], "id": "CVE-2022-34169", "lastModified": "2024-01-17T15:15:09.640", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-07-19T18:15:11.740", "references": [ { "source": "security@apache.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/168186/Xalan-J-XSLTC-Integer-Truncation.html" }, { "source": "security@apache.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/07/19/5" }, { "source": "security@apache.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/07/19/6" }, { "source": "security@apache.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/07/20/2" }, { "source": "security@apache.org", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/07/20/3" }, { "source": "security@apache.org", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/10/18/2" }, { "source": "security@apache.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/04/8" }, { "source": "security@apache.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/07/2" }, { "source": "security@apache.org", "tags": [ "Issue Tracking", "Mailing List", "Vendor Advisory" ], "url": "https://lists.apache.org/thread/12pxy4phsry6c34x2ol4fft6xlho4kyw" }, { "source": "security@apache.org", "tags": [ "Issue Tracking", "Mailing List", "Vendor Advisory" ], "url": "https://lists.apache.org/thread/2qvl7r43wb4t8p9dd9om1bnkssk07sn8" }, { "source": "security@apache.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00024.html" }, { "source": "security@apache.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L/" }, { "source": "security@apache.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM/" }, { "source": "security@apache.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2/" }, { "source": "security@apache.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO/" }, { "source": "security@apache.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ/" }, { "source": "security@apache.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB/" }, { "source": "security@apache.org", "url": "https://security.gentoo.org/glsa/202401-25" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220729-0009/" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5188" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5192" }, { "source": "security@apache.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5256" }, { "source": "security@apache.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "sourceIdentifier": "security@apache.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-681" } ], "source": "nvd@nist.gov", "type": "Primary" } ] } } } }
ghsa-9339-86wc-4qgf
Vulnerability from github
Published
2022-07-20 00:00
Modified
2024-06-24 21:23
Severity ?
Summary
Apache Xalan Java XSLT library integer truncation issue when processing malicious XSLT stylesheets
Details
The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode.
A fix for this issue was published in September 2022 as part of an anticipated 2.7.3 release.
{ "affected": [ { "package": { "ecosystem": "Maven", "name": "xalan:xalan" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "2.7.3" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2022-34169" ], "database_specific": { "cwe_ids": [ "CWE-681" ], "github_reviewed": true, "github_reviewed_at": "2022-07-21T22:28:36Z", "nvd_published_at": "2022-07-19T18:15:00Z", "severity": "HIGH" }, "details": "The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode.\n\nA fix for this issue was published in September 2022 as part of an anticipated 2.7.3 release.", "id": "GHSA-9339-86wc-4qgf", "modified": "2024-06-24T21:23:11Z", "published": "2022-07-20T00:00:18Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169" }, { "type": "WEB", "url": "https://xalan.apache.org" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "type": "WEB", "url": "https://www.debian.org/security/2022/dsa-5256" }, { "type": "WEB", "url": "https://www.debian.org/security/2022/dsa-5192" }, { "type": "WEB", "url": "https://www.debian.org/security/2022/dsa-5188" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20240621-0006" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20220729-0009" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/202401-25" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00024.html" }, { "type": "WEB", "url": "https://lists.apache.org/thread/x3f7xv3p1g32qj2hlg8wd57pwcpld471" }, { "type": "WEB", "url": "https://lists.apache.org/thread/2qvl7r43wb4t8p9dd9om1bnkssk07sn8" }, { "type": "WEB", "url": "https://lists.apache.org/thread/12pxy4phsry6c34x2ol4fft6xlho4kyw" }, { "type": "WEB", "url": "https://gitbox.apache.org/repos/asf?p=xalan-java.git;a=commit;h=da3e0d06b467247643ce04e88d3346739d119f21" }, { "type": "WEB", "url": "https://gitbox.apache.org/repos/asf?p=xalan-java.git;a=commit;h=ab57211e5d2e97cbed06786f919fa9b749c83573" }, { "type": "WEB", "url": "https://gitbox.apache.org/repos/asf?p=xalan-java.git;a=commit;h=2e60d0a9a5b822c4abf9051857973b1c6babfe81" }, { "type": "PACKAGE", "url": "https://gitbox.apache.org/repos/asf?p=xalan-java.git" }, { "type": "WEB", "url": "http://packetstormsecurity.com/files/168186/Xalan-J-XSLTC-Integer-Truncation.html" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2022/07/19/5" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2022/07/19/6" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2022/07/20/2" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2022/07/20/3" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2022/10/18/2" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2022/11/04/8" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2022/11/07/2" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "type": "CVSS_V3" } ], "summary": "Apache Xalan Java XSLT library integer truncation issue when processing malicious XSLT stylesheets" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.